Description of this paper

BAM 509 FINAL EXAM(1-50)




1. The three activities in an information system that produce the information organizations use to;control operations are;a. input, output, and feedback.;b. input, processing, and output.;c. data analysis, processi ng, and feed back.;d. information retrieval, research, and analysis.;2. Converting raw data into a more meaningful form is called;a. processi ng.;b. organizing.;c. capturing.;d. feedback.;3. The fundamental set of assumptions, values, and ways of doing things that has been accepted;by most of a company's members is called its;a. atmosphere.;b. environment.;c. culture.;d. values.;4. The hardware and software used to transfer data in an organization is called;a. networking and telecommunications technology.;b. data management technology.;c. networking and data management technology.;d. data and telecommunications technology.;5. Networking and telecommunications technologies, along with computer hardware, software;data management technology, and the people required to run and manage them, constitute an;organization's;a. networked environment.;b. data management environment.;c. information system.;d. IT infrastructure.;3;e.;6. An example of a business using information systems for customer and supplier intimacy is;a. Wal-Mart's RetailLink system.;b. the Mandarin Oriental hotel's customer-preference tracking system.;c. Apple Inc.'s iPod.;d. Verizon's Web-based digital dashboard.;7. A corporation that funds a political action committee, which in turn promotes and funds a;political candidate who agrees with the values of that corporation, could be seen as investing in;which main category of complementary assets?;a. Social;b. Organizational;c. Governmental;d. Managerial;8. Apple Computer dominates the online legal music sales industry primarily because of a failure;of recording label companies to;a. modernize their information value chain.;b. adopt a new business model.;c. invest in technology.;d. invest in complementary assets.;9. Disciplines that contribute to the technical approach to information systems are;a. engineering, utilization management, and computer science.;b. management science, computer science, and engineering.;c. computer science, engineering, and networking.;d. operations research, management science, and computer science.;10. Which field of study focuses on both a behavioral and technical understanding of information;systems?;a. Management information systems;b. Economics;c. Operations research;d. Sociology;11. Identifying customers is a responsibility of the function.;a. finance and accounting;b. sales and marketing;c. manufacturing and production;d. human resources;4;f.;12. All of the following statements regarding Lotus Notes are true except for;a. It began as an e-mail and messaging client.;b. It is the most widely used collaboration tool at Fortune 1000 companies.;c. It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.;d. Firmwide installations at a large company require specialized servers and may cost;millions of dollars per year.;13. Which type of system would you use to determine what trends in your supplier's industry will;affect your firm the most in five years?;a. ESS;b. DSS;c. MIS;d. TPS;14. What is the most important function of an enterprise application?;a. Enabling a company to work collaboratively with customers and suppliers;b. Enabl i ng cost-effective e-busi ness processes;c. Increasing speed of communicating;d. Enabling business functions and departments to share information;15. The point-of-sale Pulse system used by Domino's to maintain consistent and efficient;management functions in its restaurants is best categorized as which type of system?;a. DSS;b. CRM;c. TPS;d. more than one of the above;16. In Domi no's upgraded Pulse Evol ution system, it incorporated a Pizza Tracker functional ity;that shows the progression of individual pizza orders. This is an example of using information;systems to achieve which business objective?;a. Improved decision making;b. Operational excellence;c. Survival;d. Customer and supplier intimacy;5;g.;17. The four major enterprise appl ications are;a. SCMs, CRMs, DSSs, and KMSs.;b. enterprise systems, SCMs, CRMs, and KMSs.;c. enterprise systems, SCMs, DSSs, and CRMs.;d. SCMs, CRMs, ESSs, and KMSs.;18. You are planning the launch of your new company, an application service provider that;provides an online timesheet and project tracking application. To best communicate with and;manage your relationship with your users, you would want to implement atn).;a. CMS.;b. KMS.;c. intranet.;d. extra n et.;19. Which of the following types of system helps expedite the flow of information between the firm;and its suppliers and customers?;a. KMS;b. extra net;c. intranet;d. TPS;20. The use of digital technology and the Internet to execute the major business processes in the;enterprise is called;a. enterprise applications.;b. e-commerce.;c. MIS.;d. e-business.;21. The CPO is responsi ble for;a. overseeing the use of information technology in the firm.;b. making better use of existing knowledge in organizational and management processes.;c. enforcing the firm's information security policy.;d. ensuring that the company complies with existing data privacy laws.;22. Wh ich of the followi ng is not one of the fifteen categories of collaborative software tools?;a. Event scheduling;b. White boarding;c. File sharing;d. Extranets;6;h.;23. As discussed in the chapter opening case, which of the four generic strategies did Verizon;employ to combat the competition offered by AT&T?;a. Customer and supplier intimacy;b. Product differentiation;c. Focus on market niche;d. Low-cost leadership;24. How does the technical view of organizations fall short of understanding the full impacts of;information systems in a firm?;a. It sees the organization as a social structure similar to a machine.;b. It sees information systems as a way to rearrange the inputs and outputs of the;organ ization.;c. It sees the inputs and outputs, labor and capital, as being infinitely malleable.;d. It sees capital and labor as primary production factors.;25. According to the definition of organizations, an organization is seen as a means by;which primary production factors are transformed into outputs consumed by the environment.;a. microeconomic;b. behavioral;c. sociotechnical;d. macroeconomic;26. All of the following are major features of organizations that impact the use of information;systems EXCEPT for;a. goals.;b. environments.;c. agency costs.;d. busi ness processes.;27. Business processes are collections of;a. routines.;b. formalized and documented practices.;c. informal practices and behaviors.;d. rights and privi leges.;28. According to Leavitt's model of organizational resistance, the four components that must be;changed in an organization in order to successfully implement a new information system are;a. tasks, technology, people, and structure.;b. technology, people, culture, and structure.;c. organization, culture, management, and environment;d. environment, organization, structure, tasks.;7;i.;29. Amazon's use of the Internet as a platform to sell books more efficiently than traditional;bookstores illustrates which type of competitive strategy;a. marketi ng effectiveness.;b. strengthening supplier intimacy.;c. focusi ng on market niche.;d. low-cost leadership.;30. Hilton Hotels' use of customer information software to identify the most profitable customers;to direct services to is an example of using information systems to;a. strengthen customer intimacy.;b. differentiate their service.;c. increase efficiency.;d. focus on market niche.;31. An example of synergy in business is;a. Blockbuster combining traditional video rental with online video rental.;b. Wal-Mart's order entry and inventory management system to coordinate with suppliers.;c. Amazon's use of the Internet to sell books.;d. JP Morgan Chase's mergers with other banks that provided JP Morgan with a network;of retail branches in new regions.;32. A virtual company;a. uses Internet technology to maintain a networked community of users.;b. uses Internet technology to maintain a virtual storefront.;c. provides entirely Internet-driven services, or virtual products.;d. uses the capabilities of other companies without being physically tied to those;companies.;33. Which of the following best describes how new information systems result in legal gray areas?;a. They work with networked, electronic data, which are more difficult to control than;information stored man ually.;b. They are implemented by technicians rather than managers.;c. They result in new situations that are not covered by old laws.;d. They are created from sets of logical and technological rules rather than social or;organ izational mores.;34. Which of the five moral dimensions of the information age do the central business activities of;ChoicePoint raise?;a. System quality;b. Property rights and obi igations;c. I nformation rights and obi igations;d. Accountability and control;8;j.;35. The feature of social institutions that means mechanisms are in place to determine;responsibility for an action is called;a. the judicial system.;b. the courts of appeal.;c. due process.;d. accountability.;36. Which of the following is not one of the five steps discussed in the chapter as a process for;analyzing an ethical issue?;a. Identify the stakeholders.;b. Identify and clearly describe the facts.;c. Assign responsibility.;d. Identify the options you can reasonably take.;37. The Federal Trade Commission FIP principle of Notice/Awareness states that;a. data collectors must take responsible steps to assure that consumer information is;accurate and secure from unauthorized use.;b. customers must be allowed to choose how their information will be used for secondary;purposes other than the supporting transaction.;c. Web sites must disclose their information practices before collecting data.;d. there is a mechanism in place to enforce FIP principles.;38. European privacy protection is than in the United States.;a. much more stringent;b. less liable to laws;c. less far-reaching;d. much less stringent;39. What legal mechanism protects the owners of intellectual property from having their work;copied by others?;a. Patent protection;b. Fair use doctrine;c. Intellectual property law;d. Copyright law;40. Two of the three principal sources of poor system performance are;a. hardware or facility failures and malware.;b. software bugs and errors and outdated standards.;c. hardware or facility failures and poor input data quality.;d. poor input data quality and insufficient integration with legacy systems.;9;k.;41. CVS refers to;a. eyestrain related to computer display screen use.;b. wrist injuries brought about by incorrect hand position when using a keyboard.;c. carpal vision syndrome.;d. stress induced by technology.;42. Which of the following is NOT an IT infrastructure service component?;a. Physical facility management to manage the facilities housing physical components;b. Computing platforms to provide a coherent digital environment;c. IT management services to plan and develop the infrastructure and provide;project management;d. Operating system software;43. In a multi-tiered network;a. processing is split between clients and servers.;b. processing is handled by multiple, geographically remote clients.;c. the work of the entire network is centralized.;d. the work of the entire network is balanced over several levels of servers.;44. unleash powerful economies of scale and result in declines in manufactured;computer products.;a. CI ientlserver tech nologies;b. I nternet and web technologies;c. Technology standards;d. Linux and open-source software;45. A SAN is a network.;a. server area;b. service-oriented arch itecture;c. scalable architecture;d. storage area;46. The leading networking hardware providers include;a. Dell, HP/Compaq, and IBM.;b. IBM, Oracle, and Sun.;c. Cisco, Alcatel-Lucent, and Nortel.;d. Seagate, Maxtor, and Western Digital.;10;l.;47. Which of the following is NOT an example of the emerging mobile computing platforms?;a. netbooks;b. CRM;c. cell phones;d. the Kindle;48. Linux is;a. an example of open-source software.;b. especially useful for processing numeric data.;c. designed for specific machines and specific microprocessors.;d. primarily concerned with the tasks of end users.;49. What is the foundation technology for Web services?;a. HTML;b. UDDI;c. SOAP;d. XML;50. Which of the following is NOT one of the main six factors to consider when evaluating how;much your firm should spend on IT infrastructure?;a. Your firm's organizational culture;b. Your firm's business strategy;c. Market demand for your firm's services;d. The IT investments made by competitor firms


Paper#79810 | Written in 18-Jul-2015

Price : $22