MIS 850 Try Questions-1
MIS 850 Try Questions-1
MIS 850 Try Questions-1
1. Which of the following objectives best describes the business strategy behind the technologies
implemented by the San Francisco Giants, as discussed in the Chapter case?
Ans_ Competitive advantage
2. The Mandarin Oriental Hotel’s use of computer systems to keep track of guests’ preferences is an
example of
Ans_ Customer and Supplier intimacy
4. Which of the following is not one of the current changes taking place in information systems
technology?
Ans_ Growth in the PC platform
5. An example of a business using information systems to create new products and services is
Ans_ Apple Inc.’s iPod
7. Which of the following would not be used as an input for an information system?
Ans_ Digital dashboard
9. Output
Ans_ Transfer processed information to the people who will use it or to the activities for which will be
used
15. Disciplines that contribute to the technical approach to information systems are
Ans_ Operation research, management science, and computer science
16. All of the following are advantages, for a firm, of cloud computing except
Ans_ Ability to improve communication
1
17. Which of the following best describes the primary reasons for implementing a new information system
from a business perspective?
Ans_ The system will create new value fir the firm, beyond its costs.
18. A firm that must invest in new information systems capabilities in order to comply with federal
legislation can be said to be investing to achieve which business objective?
Ans_ Survival
19. The six important business objectives of information technology are new products, services, and
business models; customer and supplier intimacy; survival; competitive advantage; operational
excellence; and
Ans_ Improved decision making
20. Verizon corporation use of a web-based digital dashboard to provide managers with precise real-time
information illustrates which business objective?
Ans_ Improved decision making
21. Maintaining the organization’s financial records is a central purpose of which main business function?
Ans_ Finance and accounting
22. Thomas Friedman’s declaration that the world was now Flat meant that
Ans_ The internet has reduced the economic advantages of developed countries
23. The fundamental set of assumptions, values, and ways of doing things that has been accepted by most
of a company’s members is called its
Ans_ Culture
24. The temp agency that you own is having serious difficulties placing temps because few of them are
familiar with internet research investing in training software to enhance your worker’s skills is an
example of using technology to achieve which business objective?
Ans_ survival
25. Which of the following is not one of the primary environmental actors with an organization and its
information systems?
Ans_ sales force
26. The three activities in an information system that produce the information organizations use to control
operations are
Ans Input, processing and output
27. A corporation that funds a political action committee, which in tum promotes and funds a political
candidate who agrees with the values of that corporation, could be seen as investing in which main
category of complementary assets?
Ans_ Social
28. The discipline that focuses on mathematical techniques for optimizing parameters of organizations,
such as transportation and inventory control, is
Ans_ Operations research
29. An example of a business information systems for customer and supplier intimacy is
Ans The Mandarin Oriental hotel’s customer-preference tracking system
2
Ans_ Intellectual property, core competencies, and financial and human assets
31. The three principal levels within business organization hierarchy are
Ans_ Senior management, Middle management, and operational management
33. In a business hierarchy, the level that is responsible for monitoring the daily activities of the business
is
Ans_ Operational Management
34. Which of the following constitutes an organizational element in the UPS tracking system described in
the chapter?
Ans_ The specification of procedures for identifying packages with sender and recipient information
35. Engineers, scientists, or architects, who design new products or services for a firm, belong to which
level of a business hierarchy?
Ans_ Knowledge workers
37. Networking and telecommunications technologies, along with computer hardware, software, data
management technology, and the people required to run and manage them, constitute an organization’s
Ans_ IT infrastructure
39. Which main business function is responsible for maintaining employee records?
Ans_ Human resources
40. The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the use of
information systems to achieve business objective?
Ans_ Survival
41. Data management technology consists of the
Ans_ software governing the organization of data on physical storage media
42. The use of information systems because of necessity describes the business objective of
Ans_ A survival
43. Which field of study focuses on both a behavioural and technical understanding of information
systems?
Ans_ Management information systems
45. Apple computer dominates the online legal music sales industry primarily because of a failure of
recording label companies to
Ans_ adopt a new business model
3
46. The field that deals with behavioural issues as well as technical issues surrounding the development,
use, and impact of information systems used by managers and employees in the firm is called
Ans_ management information systems
47. A managerial element in the UPS tracking system described in the chapter is
Ans_ the decision to use automation
48. From a business perspective, raw data is transformed systematically during various stages,
transforming it into valuable information, in a process called
Ans_ the information value chain
49. Which of the following roles in a firm would be least affected by using mobile devise to access firm
information systems?
Ans_ Production workers
52. All of the following are reasons for the increased business focus on collaboration and teamwork,
except for
Ans the need for more efficient work hierarchies
53. Which type of system would you use to forecast the return on investment if you used new suppliers
with better delivery track records?
Ans_ DSS
55. FWO’s use of SharePoint for project management is an example of using information systems to
archive which business objective?
Ans_ Improved decision making
56. To consolidate the relevant knowledge and experience in the firm and make it available to improve
business process and management decision making, you would use a(n)
Ans_ KMS
57. A(n)____ social networking tool creates business value by connecting the members of an organization
through profiles, updates, and notifications that are tailored to internal
Ans_ Enterprise
58. ____ systems are especially suited to situations in which the production for arriving at a solution may
not be fully defined in advance
Ans_ Decision-support
59. If your main supplier was late in delivering goods, which type of system would you use to update your
production schedule?
Ans_ TPS
60. Which of the following tools would you use to evaluate and choose a collaboration tool for your
organization?
Ans_ the time/space collaboration and social tool matrix
4
61. A(n)____ system collects data from various key processes and stores the data in a single
comprehensive data repository, usable by other parts of the business
Ans_ Enterprise
62. The term ‘management information systems’ designates a specific category of information system
serving
Ans_ middle management functions
63. Using ____ to enable government relationships with citizens, businesses, and other arms of
government is called e-government
Ans_ the internet and networking technologies
64. You manage the IT department at small start-up internet advertiser. You need to set up an inexpensive
system that allows customers to see real-time statistics such as views and clicks-through about their
current banner ads. Which type of system will most efficiently provide a solution?
Ans_ Extranet
65. Which of the following systems would you expect to deliver integrated business content through a web
portal interface?
Ans_ Executive support systems
67. All the following statements regarding IBM Notes are true except which one?
Ans_ it begun as an e-mail and messaging client
68. You have been hired by a non-profit agency to implement a system to handle their donations. The
system must be able to handle and record telephone, SMS, and internet donations, provide up-to-the-
minute reports, and create highly customizable mailing lists. In addition, events fundraisers need to be
able to quickly access a donor’s information and history. Which of the following systems will best
meet these needs?
Ans_ TPS with MIS capabilities
71. In ____ digital technology and the internet are used to execute the major business processes in the
enterprise
Ans_ e-business
72. Which level of the organization are ESS specially designed to serve?
Ans_ Senior Management
73. Which of the following systems is designed to support organization –wide process and integration?
Ans_ Enterprise applications
5
Ans_ Creating new product
75. To forecast trends in your supplier’s industry that could affect your firm over the next five years, you
would use(n)
Ans_ ESS
76. To monitor the status of internal operations and the firm’s relation with the environment managers
need____ systems
Ans_ transaction processing
77. You have been hired by Inspiration Inc, to help improve their margin. Inspiration Inc. is a business
communications consultancy that services many clients in different industries throughout the United
States.
The end products of the company are customized recommendations for the best use of a client’s
existing media. The company has approximately 100 consultants, all of whom are located in their
central headquarters in Chicago. What system do you recommend to improve the company’s business
processes and increase their margin?
Ans_ Extranet, to enable quick collaboration over the internet, minimize the time spent
communicating with the client, and minimize the amount of paperwork needed
78. The principal liaison between the information systems groups and the resr of the organization is a(n)
Ans_ Systems analyst
79. Which type of system integrates supplier manufacturer distributor and customer logistics processes?
Ans_ Supply-chain management system
80. The____ helps design programs and systems to system to find new sources of knowledge or to make
better use of existing knowledge in organizational and management processes
Ans_ CKO
81. You would use a(n)_____ in order to determine which of your suppliers has the best and worst records
for keeping to your production schedule?
Ans_ MIS
83. Executive support systems are information systems that support the
Ans_ long-range planning activities of senior management
84. Non-typical business problems with causes and effects that are rapidly changing are typically handled
by which type of the information system?
Ans_ DSS
86. ____ allows you to communicate with avatars using text messaging
Ans_ A virtual world
87. A relocation control system that reports summaries on the total moving, house hunting and home
financing costs for employees in all company divisions would fall into the category of
Ans_ Management information systems
6
88. Which of the following types of system helps coordinate the flow of information between the firm and
its suppliers and customers?
Ans_ Extranet
89. _____ is a collaboration tool that supports remote (different place) synchronous (same time)
collaboration
Ans_ Video conferencing
91. To manage relationships with your customers, you would use a(n)____system.
Ans_ CRM
92. _____ enable management to make better decision regarding and scheduling sourcing production, and
destruction.
Ans_ SCMs
93. A___ is a senior manager who oversees the use of it in the firm.
Ans_ CIO
95. Which of the following is the greatest obstacle in enabling collaboration between employees at
different distant corporate locations?
Ans_ Time zones
98. Which of the following is not one of the four main classifications for collaboration tools identified by
the space/time matrix?
Ans_ Remote/Colocated
99. Which of the following decision requires knowledge based on collaboration and interaction?
Ans_ Should we work with outside vendors on new products and services?
101. A firm can exercise greater control over its suppliers by having
Ans_ more suppliers
7
Ans_ Highlights specific activities in the business where competitive strategies can best be applied
104. An organization is a
Ans_ A, B, and C
106. How are information systems used at the industry level to achieve strategic advantage?
Ans_ By building industry-wide, it-support consortia and symposia
107. Which model is used to describe the interaction of external forces that affect an organization’s
strategy and ability to compete?
Ans_ competitive forces model
108. All of the following are IT-enabled products and services providing competitive advantage
except
Ans_ Walmart’s RetailLink system
109. The more any given resource is applied to production, the lower the marginal gain in output,
until appoint is reach where the additional inputs produce no additional output. This is referred to as
Ans_ The law of diminishing returns
110. Which of the following best illustrates the use of information systems to focus on market
niche?
Ans_ A department store creating specialized products for preferred customers
114. How does the technical view of organization fall short of understanding the full impacts of
information systems in a firm?
Ans_ It sees the inputs and outputs, labor and capital as being infinitely malleable
115. The interaction between information systems and organizations is influenced
Ans_ By the development of new information technologies
116. What are the most successful solutions or methods for achieving a business objective?
Ans_ Best practices
117. The divergent viewpoints about how resources, reward and punishments should be distributed
and the struggles resulting from these difference are known as
Ans_ Politics
8
Ans_ Substitute products or services
122. Sociotechnical changes affecting a firm adopting new information systems requiring
organization change can be considered
Ans_ Strategic transitions
123. _____ is a competitive strategy for brand loyalty by developing new and unique products and
services that are not easily duplicated by competitors
Ans_ Product differentiation
124. When two organizations pool markets and expertise that result in lower costs and generate
profits, it is referred to as creating
Ans_ Synergies
126. The ability to offer individually tailored products or services using the same production
resources as bulk production is known as
Ans_ Mass customization
127. Along with capital, ____ is the primary production input that the organization uses to create
products and services
Ans_ labour
128. A collection of independent firms that use information technology to coordinate their chains to
produce a product or service for a market collectively is called
Ans_ Value web
131. An organization is seen as a means by which primary production factors are transformed into
outputs consumed by the environment according to be the____ definition of organizations
Ans_ Microeconomic
134. Which of the following is one of the support activities in a firm’s value chain?
Ans_ Technology
9
135. A(n)___ is a collection of independent firms that use information technology to coordinate
their value chains to collectively produce a product or service for a market
Ans_ Value web
136. The parts of an organization’s infrastructure, human resources, technology, and procurement
that make the delivery of the firm’s products or services possible are known as ___ activities
Ans_ Support
137. When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred
to as
Ans_ Transaction costs
138. Why does Amazon.com need to worry about competitors in online shopping?
Ans_ Internet technologies are universal, and therefore usable by all companies
139. According to research on organizational resistance, the four components that must be changed
in an organization in order to successfully implement a new information system are
Ans_ Task, technology, people, and structure
140. All of the following statements are true about information technology’s impact on business
firms except
Ans_ it helps firms lower the cost of the market participation
143. The expenses incurred by a customer or company in lost time and resources when changing
from one supplier or system to competing supplier or system to a competing supplier or system are
known as
Ans_ Switching costs
144. ___ technologies radically change the business landscape and environment
Ans_ Disruptive
145. All of the following industries have been disrupted by the internet except
Ans_ Clothing
146. As discussed in the chapter opening case, which of the four generic strategies did T.J. Maxx
employ to combat the competition offered by Target Kohls, Walmart, Macy’s and pure online stores
like Rue LaLa and Gilt Groupe?
Ans_ Market niche focus
147. An activity business perform to measure and compare business process to similar processes of
the other companies within their industry is
Ans_ Benchmarking
149. Amazon’s use of the internet as platform to sell books more efficiently than traditional
bookstores illustrates a use of information services for
10
Ans_ Low-cost leadership
150. ____ means that you accept the potential costs and obligations for the decision you make
Ans_ Responsibility
151. ____ is a societal practice of having laws that are known and understood, along with the ability
to appeal to higher authorities to ensure that laws are applied correctly
Ans_ Due process
153. ____ is a new data analysis technology that finds hidden connections between data in disparate
sources
Ans_ NORA
154. The central business activities of ChoicePoint raise which of the moral dimensions?
Ans_ Information rights and obligations
155. A peer at work takes small amounts of office suppliers for her own use at home, saying that
this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the
loss would no longer be minimal. Your rationale expresses which historical ethical principle
Ans_ Kant’s Categorical Imperative
156. As per the ___, if an action cannot be taken repeatedly, it is not right to take at all
Ans_ slippery-slope rule
157. Look and feel copyright infringement lawsuit are concerned with
Ans_ the distinction between an idea and its expression
158. Which of the following is the primary reason that the practice of spamming has grown
exponentially?
Ans_ It is very inexpensive and can reach so many people
159. As discussed in the chapter, all of the following are steps in the process for analysing an ethical
issue except
Ans_ Assigning Responsibility
160. Re-designing and automating business process can be seen as a double- edged sword because
Ans_ Increase in efficiency may be accompanied by job losses
161. ___ are not held liable for the messages they transmit
Ans_ Regulated common carriers
11
165. Which of the following best describes the effects that new information technology has on
society?
Ans_ it has a ripple effect, raising new ethical, social and political issues
166. A man steals from a grocery store in order to feed his starving family. Which of the following
best expresses the Utilitarian Principle in evaluating this situation?
Ans_ His action is acceptable, because the higher social value is the survival of the family
167. U.S. businesses are allowed to use personal data from data from EU country if they
Ans_ Develop equivalent privacy protection policies
168. ___ prohibits an organization from any personal information unless the individual specifically
takes action to approve information collection and use
Ans_ The opt-in model
169. Which of the following U.S. laws gives patients medical records and the right to authorize how
this information can be used or disclosed?
Ans_ HIPAA
170. Which of the following is not one of the current key technology trends that raises ethical
issues?
Ans_ Increase in multimedia quality
171. Cookies created during Website visits are stored
Ans_ On the user’s computer
172. The Federal Trade Commission FIP principle of Notice/Awareness states that
Ans_ Web sites must disclose their information practices before collecting data
173. Which of the following ailments is caused by tens of thousands of repetitions under low-impact
loads?
Ans_ RSI
174. __ Enables advertisers to display more relevant ads based on users’ search and browser history
Ans_ Behavioural targeting
175. __ restricts the information that the U.S. federal government can collect about an individual
and regulates what it can do with the information
Ans_ The Privacy Act of 1974
176. When a software product is considered ___it becomes difficult to hold software producers
liable for flaws in the product
Ans_ Similar to books
177. ___ Protects the creators of intellectual property from having work copied by others
Ans_ Copyright law
178. In the ___ model of informed consent, personal information can be collected until the
consumer specifically requests that his or her data not collected
Ans_ Opt-Out
179. ____ is a feature of social institutions that means mechanisms are in place to determine
responsibility for an action.
Ans_ Accountability
12
180. Which of the following is not one of the types of information gathered by Web site tracking
tools?
Ans_ Birthplace
183. The___ bought copyright law to the internet age by outlawing the circumvention of
technology-based protections of copyrighted materials
Ans_ Digital Millennium Copyright Act
185. The limitation of trade secret protection for software is that it is difficult to prevent the ideas in
the work from falling into the public domain when
Ans_ the software is widely distributed
186. In the information age, the obligation that individuals and organization have regarding the
preservation of existing values and institutions fall within the moral dimension of
Ans_ Quality of life
188. The extreme difference among different social groups regarding their access to computers and
the internet is called the ___ divide
Ans_ Digital
190. Which of the following best describes the basis for the FIP principles?
Ans_ The mutuality of interest between the record holder and the individual
191. The ___ framework developed by U.S. Department Commerce allows U.S business to legally
use personal data from country
Ans_ Safe-harbour
192. Taking the action that produces the least harm best describe the
Ans_ Risk Aversion Principle
194. Which of the following best describes how new information system result in legal gray areas?
Ans_ They result in new situations that are not covered by old laws
195. In 2010, the FTC added all of the following recommendations to its privacy guidelines except
Ans_ Firms should limit the length of time that any personal data is stored to six months or less
13
CHAPTER 5
196. _____ are computer consisting of a circuit board with processors, memory and network
connections that are stored in racks
Ans_ Blade servers
198. Which of the following is not one of the main six factors to consider when evaluating how
much your firm should spend on IT infrastructure?
Ans_ your firm’s organizational culture
199. Sets of loosely coupled software components that exchange information with each other using
standard Web communication standards and languages are referred to as
Ans_ Web services
203. Which of the following is not one of the current software platform trends?
Ans_ Multicore processors
204. The process of presenting a set of computing resources (such as computer power or data
storage)
So that they can all be accessed in ways that are not restricted by physical configuration or geographic
location is called
Ans_ Cloud computing
205. ____ provides a standard format for data exchange, enabling Web services to pass data from
one process to another
Ans_ XML
206. A(n)___ server is used to communicate between a web server and an organization’s back-end
systems
Ans_ Application server
207. ___uses individual atoms and molecules to create computer chips and other devices thinner
than a human hair
Ans_ Nanotechnology
213. The multitasking, multi-user, operating system develop by Bell laboratories that operates on a
wide variety of computing platforms is
Ans_ Unix
214. Hardware and software acquisition costs account for about __ percent of TCO
Ans_ 20
215. The ability to be in many different states at once, dramatically increasing processing power, is
a hallmark of
Ans_ Quantum computing
216. Specifications that establish the compatibility of products and the ability to communicate in a
network are called
Ans_ Technology standards
217. ____states that the value or power of a network grows exponentially as a function of the
number of network members
Ans_ Metcalfe’s Law
218. A formal contract between customers and their service providers that outlines the specific
responsibilities of the service provider and to the customer is called a(n)
Ans_ SLA
221. A software tool with a graphical user interface for displaying Web pages for accessing the Web
and other Internet resources is called a Web
Ans_ Browser
222. The network standard for connecting desktop computers into local area networks that enabled
the widespread adoption of client/server computing and local area networks and further stimulated the
adoption of personal computers is
Ans_ Ethernet
15
Ans_ XML
224. ___ takes place when s firm contracts custom software development or maintenance of existing
legacy programs to outside firms
Ans_ Outsourcing
225. Which type of computing refers to firms purchasing computing power from remote providers
and paying only for the computing power they use?
Ans_ On-demand
226. The practice of contracting custom software development to an outside firm is commonly
referred to as
Ans_ Outsourcing
227. Which type of software is created and updated by worldwide community of programmes and
available for free?
Ans_ Open source
228. Which model can be used to analyse the direct and indirect costs to help firms determine cost
of specific implementations
Ans_ Total cost of ownership
229. Which of the following is not one of the NIST defined characteristics of cloud computing?
Ans_ Reduced elasticity
230. A(n) ____ is an integrated circuit to which two or more processors have been attached for
enhanced performance and reduced power consumption
Ans_ Multicore processor
231. A set of self-contained services that communicate with each other to create a working software
application is called
Ans_ SOA
232. Which of the following factors does not help explain why computing resources today are ever
more available than in previous decades?
Ans_ widespread rejection of technology standards
233. ____ surfaces allow users to gesture on a screen with fingers to execute commands.
Ans_ Multitouch
236. Which type of infrastructure service provide voice and video connectivity to employees,
customers and suppliers?
Ans_ Telecommunication
237. Prewritten, commercially available sets of software programs that eliminate the need for a firm
to write its own software programs for certain functions, are referred to as
Ans_ Software packages
16
238. Legacy systems are still used because they
Ans_ Are too expensive to redesign
CHAPTER 6
241. The organization’s rules for sharing, disseminating, acquiring, standardizing, classifying, and
inventory information is called a(n)
Ans_ Information policy
242. A field identified in a table as holding the unique identifier of the table’s records is called the
Ans_ Primary key
243. The tool that enables users to view the same data in different ways using multiple dimensions
is
Ans_ OLAP
249. The process of streamlining data to minimize redundancy and awkward many-to-many
relationships is called
Ans_ normalization
250. The special organizational function whose responsibility include physical database design and
maintenance is a called
Ans_ Database administration
251. When the same attribute in related data files has different values, this is called data
Ans_ inconsistency
17
252. You work for a retail clothing chain whose primary outlets are in shopping malls, and you are
conducting an analysis of your customers and their preferences. You wish to find out if there are any
particular activities that your customers engage in, or the types of purchase made in made the month
before or after purchasing select items from your store. To do this, you will want to use data mining
software that is capable of
Ans_ Identifying sequences
256. A schematic of the entire database that describes the relationships in a database is called a(n)
Ans_ Entity-relationship diagram
257. Data___ occurs when the same data is duplicate in multiple files of a database
Ans_ Redundancy
260. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization and security is the
Ans_ Data dictionary
261. You are creating a database to store temperature and wind data from national airport locations.
Which of the following fields is the most likely candidate to use as the basis for a primary key in the
Airport table?
Ans_ Airport code
262. The specialized language programmers use to add and change data in the database is called
Ans_ A data manipulation language
264. All of the following are technologies used to analyse and manage big data except
Ans_ Cloud computing
265. Which of the following technologies would you use to analyse the social media data collected
by a major online retailer?
Ans_ Hadoop
266. ____ tools are used to analyse unstructured data sets, such as e-mail, memos, survey responses
etc., to discover patterns and relationships
18
Ans_ Text mining
267. In place of application server software to allow a web server to communicate with a back-end
database, you can use
Ans_ CGI
268. A field identified in a record as holding the unique identifier for that record is called the
Ans_ Key Field
270. A one-to-many relationship between two entities is symbolized in a diagram by a line that ends
with
Ans_ A crow’s foot topped by a short mark
271. Which common database challenge is illustrated by a person receiving multiple copies of an
L.L. Bean catalog, each addressed to a slightly different variation of his or her full name?
Ans_ Data inconsistency
272. Which of the following features enables a DBMS to reduce data redundancy and
inconsistency?
Ans_ Minimizes isolated files with repeated data
273. The traditional file environment does not typically have a problem with
Ans_ Program-data independence
274. Which of the following is not a method for performing a data quality audit?
Ans_ Surveying data definition and query files
CHAPTER 7
279. ____ monetizes the value of the data stored by search engines
Ans_ Search engine marketing
280. The most appropriate wireless networking standards for creating PAns is
Ans_ Bluetooth
19
282. ____ integrate disparate channels for voice communications, data communications, instant
messaging, e-mail, and electronic conferencing into a single experience
Ans_ United communications
283. A(n)____ is a commercial organization with permanent connection to the internet that sells
temporary connections to rental subscribers
Ans_ ISP
284. Which digital cellular standard is used widely throughout the world except the United States?
Ans_ GSM
285. T1 lines
Ans_ are high-speed, leased data lines providing guaranteed service levels
286. _____ combine the functionality of cell phone with the computing of a laptop
Ans_ Smartphones
290. All of the following are physical components of an RFID system except
Ans_ Barcode
291. Which process is used to protect transmitted data in VPN?
Ans_ Tunnelling
292. A network that spans a city and sometimes its major suburbs as well is called a
Ans_ MAN
294. What services converts IP addresses into more recognizable alphanumeric name?
Ans_ DNS
295. Web browser software requests web pages from the internet using which protocol?
Ans_ HTTP
296. One or more access points positioned on a ceiling wall or the strategic spot in a public place to
provide maximum wireless coverage for a specific area are referred to as
Ans_ Hotspots
297. Which type of network treats all processors equally and allows peripheral devices to be shared
without going to a separate server?
Ans_ Peer-Peer
20
298. The backbone networks of the internet are typically owned by long-distance telephone
companies called
Ans_ Network service providers
300. The method of slicing digital messages into parcels transmitting then along different
communication paths and reassembling them at their destination is called
Ans_ Packet Switching
301. The process of employing techniques to help a web site achieve a higher ranking with the
major search engines is called
Ans_ SEO
304. The device that acts as a connection point between computers and can filter and forward data to
a specifies destination is called a(n)
Ans_ Switch
306. The concept of a future Web in which it is commonplace for everyday objects to be connected,
controlled or monitored over internet is called
Ans. The Internet of things
308. What technology allows people to have content pulled from Web sites and fed automatically to
their computers?
Ans_ HTTP
310. Which of the following is not one the top five search engines?
Ans_ Facebook
311. To use the analog telephone system for sending digital data, you must also use
Ans_ A modem
312. A network that covers entire geographical region is most commonly referred to as a(n)
Ans_ Wide area network
21
314. Which of the following is the first generation of cellular systems suitable for watching videos?
Ans_ 4G
315. The total amount of digital information that can be transmitted through any telecommunication
through any telecommunications medium is measured in
Ans_ bps
CHAPTER 8
316. ___ refers to all of the methods policies and organizational procedures that ensure the safety of
the organization’s assets, the accuracy and reliability of its accounting records, and operational
adherence to management standards
Ans_ Controls
317. Statements ranking information risks and identify security goals are included in a(n)
Ans_ Security policy
319. Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a(n)___ attack.
Ans_ DDos
323. Analysis of an information system that rates the likelihood of a security incident occurring and
its cost is included in a(n)
Ans_ Risk assessment
324. A salesperson clicks repeatedly on the online ads of a competitor’s in order to drive the
competitor’s advertising costs up. This is an example of
Ans_ Click Fraud
326. Which of the following specifications replaces WEP with a strong security standard that
features changing encryption keys?
Ans_ WPA2
327. Large amount of data stored in electronic form are___ than the same data in manual form.
Ans_ Vulnerable to many more kinds of threats
22
328. Which of the following is not an example of a computer used as a target of crime?
Ans_ Illegally accessing stored electronic communication
329. Which of the following statements about the internet security is not true?
Ans_ VoIP is more secure than the switched voice network
332. Which of the following is a virus that uses flaws in windows software to take over a computer
remotely?
Ans_ Conficker
334. Social networking site have become a new conduit for malware because
Ans_ They allow users to post software code
337. Comprehensive security management products, with tools for firewalls, VPNs, intrusion
detection systems, and more, are called___ systems.
Ans_ UTM
340. ___ use scanning software to look for known problems such as bad passwords, the removal
important files, security attacks in progress, and system administration errors
Ans_ Intrusion detection systems
342. In which method of encryption is a single encryption key sent to the both sender and receiver
share the same key?
Ans_ Symmetric key encryption
23
344. The international defacement or destruction of a Web site called
Ans_ Cyber vandalism
345. You have been hired as a security consultant for law firm. Which of the following constitutes
the greatest source for network security breaches to the firm?
Ans_ Employees
347. ____ is malware that hijacks a user’s computer and demands payment in return for giving back
access.
Ans_ Ransomware
350. All of the following are types of information systems general control except
Ans_ Application controls
CHAPTER 9
353. From your reading of the chapter’s opening case, ACH food Companies implemented in order
to achieve which of the following business objectives?
Ans_ Operation excellence
354. Enterprise software is built around thousands of predefined business processes that reflect
Ans_ Best practices
355. A scheduling system for minimizing inventory by having components arrive exactly at the
moment they are needed and finished goods shipped as soon as they leave the assembly line best
describes a ____ strategy
Ans_ Just-in-time
356. A company’s organizations and processes for distributing and delivering products to the final
customers is the
Ans_ Downstream portion of the supply chain
357. Supply chain ___ systems manage the flow of products through distribution centres and
warehouses to ensure that products are delivered to the right locations in the most efficient manner
Ans_ execution
24
358. A network of organization and business processes for procuring raw materials, transforming
these materials into intermediate and finished products, and distributing the finished products to
customer is called a
Ans_ Supply chain
360. Which of the following is an important capability for sales processes that is found in most
major CRM software products?
Ans_ Lead management
362. A ____ is a method of interaction with a customer, such as telephone or customer service desk
Ans_ Touch point
365. Customer relationship management applications dealing with the analysis of customer data to
provide information for improving business performance best describes ___ applications
Ans_ Analytical CRM
368. _____modules deal with issues such as setting objectives, employee performance management,
and performance-based compensation.
Ans_ ERM
369. You have been asked to implement enterprise software for manufacturer of kitchen appliances.
What is the first step you should take?
Ans_ Select the functions of the system you wish to use
371. A distortion of information about the demand for a product as it passes from one entity to next
across the supply chain is called the __ effect
Ans_ Bullwhip
372. Which of the following traditional solutions manufacturers to deal with uncertainties in the
supply chain?
Ans_ Safety stock
25
373. When tailoring a particular aspect of a system to the way a company does business, enterprise
software can provide the company with
Ans_ Configuration tables
377. The business value of an effective supply chain management system includes all the following
except
Ans_ improved deliver service
378. Enterprise application vendors have created ___ to make their own customer relationship
management supply chain management, and enterprise systems work together with each other
Ans_ e-business suits
379. A company having difficulty with timely delivery of parts to is manufacturing plants should
implement a supply chain __ system
Ans_ Execution
380. A suite of integrated software modules for finance and accounting human resources
manufacturing and processes best describes
Ans_ ERP systems
382. Enterprise application vendors are now including ____ features such as tools for data
visualization flexible reporting and ad hoc analysis as part of the application.
Ans_ Business Intelligence
CHAPTER 10
384. Which of the following best illustrates the affiliate revenue model?
Ans_ Epinions receives a fees after steering a customer to a participating Web site where he or she
makes a purchase
386. Varying a product’s price according to the supply situation of the seller is called ___pricing
Ans_ Dynamic
26
387. The lowered cost of information storage and processing and communications along with the
improvement of data quality has resulted in which unique quality of E-commence?
Ans_ Information density
388. What is the primary benefit to consumers of disintermediation?
Ans_ Lower Costs
389. The interest enables __ market by leveraging the fact that there is always some demand
however small for a product
Ans_ Long-Tail
390. A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is
called a(n)
Ans_ Exchange
391. ____ describes the concept that a large group of people is better making good decisions than a
single person
Ans_ The wisdom of crowds
392. EDI is
Ans_ The exchange between two organizations of standard transactions through a network
393. All of the following are activities related to establishing a Web presence except for
Ans_ Newsletters
394. Which of the following internet business models does Amazon.com use?
Ans_ e-tailer
396. Exposing an individual to ads that are chosen and based on the recorded and analysed online
behaviour of the individual is referred to as
Ans_ Behavioural targeting
397. A secure Web site that links a large firm to is suppliers and other key business partners is
called a(n)
Ans_ A private industrial network
398. In which of the following internet business models does a merchant create an online digital
environment that enables people with like interests to share information?
Ans_ Community provider
399. A new mobile app you are developing allows users to find friends who are logged in and
within a 10-mile radius. This would be categorized as a___ service
Ans_ Geoinformation
401. Which of the following social commence features allows social networks sites to gather and
distribute to others information about which products a user likes and dislikes
Ans_ Network notification
27
402. Which of the following marketing formats is scale oriented, rather than branding oriented or a
mix?
Ans_ Search engine
403. Selling the same goods to different targeted groups at different prices is called
Ans_ Price discrimination
404. A marketplace extended beyond traditional boundaries and removed from a temporal and
geographic location is called a(n)
Ans_ Marketspace
407. The act engaging consumers in a dialog that dynamically adjusts the experience to the
individual describe which dimension of e-commerce technology?
Ans_ Interactivity
408. Content providers use___ systems to process large amounts of very small monetary
trAnsactions cost-effectively
Ans_ micropayment
411. ___ refers to business selling goods and services electronically to individuals
Ans_ B2C e-commerce
412. Information__ exists when one party in transaction has more information that is important for
the transaction than the other party
Ans_ Asymmetry
CHAPTER 11
413. ____ knowledge exists informal documents as well as in formal rules that organization derive
by observing experts and their decision making behaviours
Ans_ Semi- structured
414. Which of the following would not be classified as a knowledge work system?
Ans_ expert system
415. _____ is the study of how computer programs can improve their performance without explicit
programming
Ans_ machine learning
28
416. Which of the following would not be considered semi structured knowledge?
Ans_ Request for proposals
417. Technology that consists of computer-based systems that attempt to emulate human behaviour
is called
Ans_ Al technology
418. In this technique descriptions of pasts experiences of human specialists are stored in a database
for later retrieval when the user encounters a situation with similar characteristics
Ans_ CBR
420. A(n)____ is a scheme for classifying information and knowledge in such a way it can be easily
accessed
Ans_ Taxonomy
421. A(n)___ is a type of intelligent technique that finds patterns and relationships in massive data
sets too large for human to analyse
Ans_ Neutral network
422. You are advising a multimedia company on the type of knowledge management system to help
them achieve digital video and sound clips. Which of the following will suit their needs?
Ans_ Digital asset management system
423. Which of the following does not describe the dimension of knowledge in a frim?
Ans_ It is subject to the laws of diminishing returns
425. You are an automotive engineer working on an application that will automatically parallel park
a car. The intelligent technique you may find most useful is
Ans_ Fuzzy logic
428. Changing organizational behaviour by sensing and responding to new experience and
knowledge is called
Ans_ Organizational learning
431. Most knowledge workers require specialized knowledge work systems but they also rely on
29
Ans_ Office systems
432. Tolls for the management delivery tracking and assessment of various types of employee
learning best describes a(n)
Ans_ learning management system
433. Software programs that work without direct human intervention to carry out specific tasks for
individual users, business processes, or software application are called
Ans_ Intelligent Agents
437. Which of the following are the three major types of knowledge management systems?
Ans_ Enterprise-wide knowledge management systems knowledge work systems and intelligent
techniques
438. Hardware and software that attempt to emulate the processing pattern of the biological brain is
best describe
Ans_ A neural network
439. A MOOC is
Ans _ type of online course
440. Which of the following describes a difference between neural networks and genetics
algorithms?
Ans_ Neural networks are programmed to learn
CHAPTER 12
441. The concept of management ___ describes situations in which managers act on preconceived
notions that reject information that does not conform to their prior conceptions
Ans_ Filters
442. The decisions involved in creating and producing a corporate intranet can be classified as ___
decisions
Ans_ Semi structured
443. Decisions regarding managing and monitoring day-to-day business activities are referred to as
___ intelligence
Ans_ Operational
30
444. An information system which combines data from internal TPS with information from
financial systems and external sources to deliver reports such as profit-loss statements and impact
analysis is an example of
Ans_ ESS
445. The dimension of ____ in formation quality describes whether data is available when needed
Ans_ Timeliness
447. GDSS
Ans_ Implement structured methods for organizing and evaluating ideas
448. Behavioural models of management sees managers as being___ than does classical model
Ans_ More informal
449. The leading methodology for understanding the really important information needed by a
firm’s executives is called the __ method
Ans_ Balanced scorecard
451. If you can follow a definite procedure to make a business decision, you are making a(n)____
decision
Ans_ Structured
453. Which of the following describes how the Simon framework of decision-making in high-
velocity decision environments?
Ans_ All four steps of the process are handled by software algorithms; humans are eliminated from
the decision because they are too slow
454. The role of entrepreneur falls into which of Mintzberg’s managerial classifications?
Ans_ Decisional
456. Which of the following statements best describes the business value of improved decision
making?
Ans_ Improved decision making results in a large monetary value for the firm as numerous small daily
decision affecting efficiency. Production costs and more add up to large annual values
457. Which of the following is not one of the six main elements in the business intelligence
environment discussed in this chapter?
Ans_ Organizational environment
458. Which of the following are most likely to rely primarily on production reports for their
decision-making needs?
Ans_ Operational supervisors
31
459. As discussed in the chapter text, three main reasons that investments in information technology
do not always produce positive results are
Ans_ Information quality, organizational culture and Management filters
460. Which quality dimension of information is concerned that the data values of an information
source fall within a define range?
Ans_ Validity
462. GDSS
Ans_ Enables increasing a meeting size without reducing productivity
463. A(n)_____ is a BI feature that presents users with an easy-to-understand visual display of
performance information
Ans_ Dashboard
464. Which of the following is not one of the five classical functions of managers?
Ans_ Leading
465. The ___ phase of decision making finds or recognizes a problem, need or opportunity
Ans_ Intelligence
466. The management methodology of using a firm’s strategy to generate operations targets for the
business and measuring progress toward then using the firms enterprise is called
Ans_ BPM
CHAPTER 13
467. Which conversion process introduces the system first to a limited portion of the organisations?
Ans_ The pilot study strategy
468. Groups of objects are assembled into software components for common function’s, which can
be combined into large-scale business applications in which type of software?
Ans_ component-based development
471. Object-oriented development could potentially reduce the time and cost of writing software
because
Ans_ Objects are reusable
473. The idea that the achievement of quality control is an end in itself describes a main concept of
32
Ans_ TQM
474. An entire information system is broken down into its subsystems by using
Ans_ High-level data flow diagrams
475. To understand and define the contents of data flows and data store, system builders use
Ans_ A data dictionary
476. Which of the following is not a tool provided by Business process management software?
Ans_ Capture and identify information system requirements for a new system
481. Which process develops a detailed description of the functions that a new information must
perform?
Ans_ A requirement analysis
484. A system building approach in which the system is developed as successive versions each
version reflecting requirements more accurately is described to be
Ans_ Iterative
485. When systems are created rapidly, without a formal development methodology
Ans_ Testing and documentation may be inadequate
486. Organizational software packages often include ___ features that allows the software to be
modified to meet organizational requirements
Ans_ Customization
487. ____ provides a detailed statement of the information needs that a new system must satisfy:
identifies who needs what information and when, where and how the information is needed
Ans_ Information requirements
33
489. In which type of systems building are the development stages organized so that tasks in one
stage are completed before the task in the next stage begin?
Ans_ Traditional
490. A bank has reworked its mortgage application process so that several steps are handled by
computer software and some steps are combined to reduce bottlenecks in processing. The goal is to
gradually improve its efficiency over time. This is an example of
Ans_ Rationalization of procedures
CHAPTER 14
491. As discussed in the chapter, which of the following is not one of the immediate consequences
of inadequate software project management?
Ans_ Customer loyalty
492. At the top of the management structure for information systems projects in a large company is
Ans_ The corporate strategic planning group
493. The principal capital budgeting models for evaluating information technology projects are the
payback method, the accounting rate of return on investment (ROI) the net present value and the
Ans_ Internal rate of return
494. Which method would you use to develop risk profiles for a firm’s information projects and
assets?
Ans_ Portfolio analysis
495. In using a portfolio analysis to determine which IT projects to pursue, you would
Ans_ Balanced high-risk, high reward projects with lower-risk projects
496. Which type of tool helps projects managers identify bottlenecks in project development?
Ans_ Formal planning and control tools
497. Which of the following is a limitation of using a financial approach to evaluate information
systems?
Ans_ Inability to assess costs form from organizational disruption
498. Which of the following statistics from studies on failed projects is not true?
Ans_ the average cost overrun of IT projects is 20 percent
500. The project ricks will rise if the project team and the IS staff lack
Ans_ The required technical expertise
34
503. You are using a capital budgeting method to assess the worth of your company’s new
information system. Which of the following costa would you include in measuring the cash outflow?
Ans_ Both B and C >>>b] hardware and software expenditures c] labour expenditures
504. Which of the following is not an organizational factor in systems planning and
implementation?
Ans_ User interface
505. Which of the following is not one the five main variables affecting project success?
Ans_ Vendors
506. On average, private sector IT projects underestimated budget and delivery time of systems by
__ percent
Ans_ 50
508. Which of the following project management variables indicates how well the project satisfies
management objectives?
Ans_ Quality
509. The ___ is directly responsible for the individual systems project
Ans_ Project team
510. Which of the following tools is not one you would use to control risk factors in an information
systems project?
Ans_ real options pricing models
511. All of the following are intangible benefits of information systems except
Ans_ Reduced workforce
512. According to your reading of the chapter, change management is a process that
Ans_ Should be addressed before a project is developed
513. The criteria used for evaluation in a scoring model are usually determined by
Ans_ Lengthy discussions among the decision- making group
CHAPTER 15
515. In terms of global business strategy and structure, a multinational company will use a policy of
Ans_ Dispersed production and marketing, with centralized accounting and strategic management
35
517. Which of the following is not one of the principal management challenges in developing global
systems?
Ans_ Defining an acceptable test plan
518. VPNs
Ans_ Are expensive to develop and maintain
519. Which of the following is not of the main benefits to implementing global systems?
Ans_ Reduced hardware costs
520. Which systems are worth sharing on a transactional basis, from a cost and feasibility point of
view?
Ans_ Only systems that support functions that are absolutely critical to the organization
522. In a multinational business strategy, the ____ business function is decentralized, dispersed to
foreign units
Ans_ Production
523. Multinational companies tend to dominantly have ___ systems
Ans_ decentralized
525. What is the thing you should considered when thinking about building an international
information system?
Ans_ Consider the global environment where your business will operate and identify the business
drivers for your firm and industry
528. Based on your reading of the chapter, why should companies avoid creating an all-
encompassing new global system when moving toward global operations?
Ans_ opposition is strengthened because of requirements for huge resources
529. In order to define centers of excellence in global firm, you would first need to identify
Ans_ Core business processes
531. Which of the following is not one of the primary types of firm strategy discussed in the
chapter?
Ans_ International exporter
36
532. A company that controls finances in the home country and decentralizes production, sales and
marketing operation to other countries is using a __ strategy.
CHAPTER 3
536. Which of the following is not major feature of organizations that impacts the use of
information systems?
Ans_ Agency costs
537. Walmart’s attempts to increase its online presence is an example of a firm information systems
to
Ans_ Achieve low-cost leadership
539. You are consulting for a cosmetics distributor who is interested in determining the benefits it
could achieve from implementing new information systems. What will you advise as the first step?
Ans_ Perform a strategic system analysis
540. Mintzberg classifies a large bureaucracy existing in a slow changing environment that products
standard product and is dominated by centralized management as a___ bureaucracy.
Ans_ ad hoc
541. Firms use a ___ strategy to provide a specialized product or service for a narrow target market
better than competitors
Ans_ Product differentiation
544. The ___ model highlights the primary or support activities that add a margin of value to a
firm’s products or services where information systems can best be applied to achieve a competitive
advantage
Ans_ Value chain
37
545. A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force
Ans_ New market entrants
CHAPTER 4
546. Key difference between software and books include all of the following except
Ans_ Software products are more easily compared to each other than books
547. The moral dimension of ____ can be described as the obligation that individual and
organizations have concerning rights to intellectual property
551. Which legal mechanism grants the owner excusive ownership of idea behind an invention for
20 years?
Ans_ Patent
552. ___ is the use of computer to assemble data from different sources to create electronic dossiers
of detailed information about individuals
Ans_ Profiling
553. Which of the following is a primary drawback to the ‘do anything anywhere’ computing
environment?
Ans_ It blurs the traditional boundaries between work and family time
CHAPTER 5
555. Which of the following refers to the ability of a computer, product or system to expand to serve
a larger number of user without breaking down?
Ans_ Scalability
556. The __ PC, becoming the standard PC in the Personal Computer Era. Uses the windows
operating system software on computer with an intel microprocessor
Ans_ Wintel
38
Ans_ Traditional mainframe-based business information systems
559. Which of the following is the most popular mobile operating system?
Ans_ Android
560. How would you determine the market demand for your firm’s IT services?
Ans_ Hold focus groups assess your services
561. All of the following are current hardware platform trends except
Ans_ Unix
562. Which of the following is not an example of the emerging mobile platform?
Ans_ CRM
563. A client computer networked to sever computer, with processing split between the two types of
machines is called a(n)
Ans_ Two-tiered client/server architecture
564. ____ unleash powerful economies of scale and result in price declines in manufactured
computer products.
Ans_ Technology standards
565. Place the following eras of IT infrastructure evolution in order, from earliest to most recent. 1.
Cloud computing Era 2. Client/Server; 3. Enterprise Era 4. Personal Computer and 5. Mainframe and
Minicomputer
Ans_ 5,4,2,3,1
566. The phenomenon of employees using their own devise in the workplace is known as
Ans_ BYOD
569. ____ allows a single computing resource, such as server, to appear to the user as multiple
logical resources
Ans_ Virtualization
570. Linux is
Ans_ An example of open source software
571. You work for a national car rental agency and want to determine what characteristics are
shared among your most loyal customers. To do this, you will want to use data mining software that is
capable of
Ans_ Classification
CHAPTER 6
572. Detecting and correcting data in a database of file that are incorrect incomplete, improperly
formatted or redundant is called
39
Ans_ Data normalization
575. A household appliances manufacturing has hired you to help analyse their social media dataset
to determine which of their refrigerators are seen as the most reliable. Which of the following tools
would you use to analyse this data?
Ans_ Sentiment analysis software
577. In a relational database, the three basic operations used to develop useful sets of data are
Ans_ Select, project and join
578. Which of the following is not one of the techniques used in Web mining?
Ans_ Server mining
580. ___ creates confusion that hampers the creation of information systems that integrate data from
different sources
Ans_ Data redundancy
CHAPTER 7
583. Which organization helps define the overall structure of the internet?
Ans_ IAB
584. Which type of network is used to connect digital devices within a half-mile or 500-meters
radius?
Ans_ LAN
585. A(n)___ is a device that forwards packets of data through different networks ensuring that the
data gets the right address.
Ans_ Router
586. A(n)___ is software for locating and managing stored Web pages
40
Ans_ Web server
588. Which of the following statements is not true about search engines?
Ans_ There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
589. A(n)____ signal is a discrete, binary waveform that transmits data coded into two discrete
states such as 1-bits and 0-bits.
Ans_ Digital
591. Bluetooth can be used to link up to____ devices within a 10-meter area using low-power,
radio-based communication
Ans_ Eight
594. Web sites that enable users to share information, collaborate and create new services and
content are called ___ sites
Ans_ Second generation
596. Together, a protocol prefix, a domain name, a directory path and a document name are called
a(n)
Ans_ uniform resource locator
597. Based on your reading of the examples in the chapter, what would be the best use of RFID for
a business?
Ans_ Managing the supply chain
CHAPTER 8
599. A foreign country attempting to access government network I order to disable a national power
grid would be an example of
Ans_ cyberwarfare
41
600. Currently, the protocols used for secure information transfer over the internet are
Ans_ SSL, TLS, and S-HTTP
601. How do software vendors correct flaws in their software after it has been distributed
Ans_ They issue patches
602. In controlling network traffic to minimize slow-downs a technology called ___ is used to
examine data files and sort low-priority data from high-priority data
Ans_ Deep-packet inspection
603. An authentication system in which a user must provide two types of identification such as a
bank card and pin is called
Ans_ Two-factor authentication
604. Your company, an online discount stationers, has calculated that a loss of internet connectivity
for 3 hours results in a potential loss of $2000 to $3000 and that there is a 50% chance of this
occurring each year. What is the annual expect loss from this exposure?
Ans_ $1,250
605. ____ is a crime in which an imposter obtains key pieces of personal information to impersonate
someone else
Ans_ Identity theft
608. A practice in which eavesdroppers drive by building or park outside and try to intercept
wireless network traffic is referred to as
Ans_ War driving
610. ____ controls ensure that valuable business data files on either disk or tape are not subject to
unauthorized access, change or destruction while they are in use or in storage
Ans_ Dta security
613. Which of the following is not an example of a computer used as an instrument crime?
Ans_ Breaching the confidentiality of protected computerized data
CHAPTER 9
42
614. Supply chain software can be classified as either supply chain __ systems or supply chain __
systems
Ans_ Planning; execution
615. Which metric is based on the relationship between the revenue produced by specific customer
that expenses incurred in acquiring and servicing that customer and the expected life of the
relationship between the customer and the company?
Ans_ Customer lifetime value
616. Systems that enable a firm to generate demand forecasts for a product and to develop sourcing
and manufacturing plans that product best describes supply chain___ systems
Ans_ Planning
617. Which of the following is not one of the four type of customers described in the case study on
Graybar?
Ans_ Service-drain customers
619. ____ CRM includes customer-facing applications such as tools for sales force automation call
centre and customer service support and marketing automation
Ans_ Operational
621. Which supply chain planning function determines how much product is needed to satisfy all
customer demands?
Ans_ Demand planning
622. ____ modules in CRM systems help sales staff increase their productivity by focusing sales
efforts on the most profitable customers those who are good candidates for sales and services
Ans_ SFA
623. ___ modules use many of the same data, tools and systems as CRM to enhance collaboration
between a company and its selling partners
Ans_ PRM
624. A supply chain driven by actual customer orders or purchase follows a ___ model
Ans_ Pull-based
627. All of the following service capabilities would be found in major CRM products except
Ans_ Order management
43
CHAPTER 10
629. Transaction brokers
Ans_ save users money and time by processing online sales transactions
630. ___ is a peer-to-peer market in which participants bet on the outcomes of current events,
business or socials trends
Ans_ A prediction market
634. Which of the following is a milestone for the web Site development phase of building an e-
commence presence?
Ans_ Web site plan
635. What standards are referred to when discussing universal standards as a unique feature of e-
commerce?
Ans_ Common spoken and written language
637. What is the difference between personalization and customization as applied to e-commerce
technologies?
Ans_ Personalization refers to adjusting marketing messages for a consumer customization refers to
adjusting a product or service based on user’s preferences
639. The process of sourcing goods and materials negotiating with suppliers paying for goods and
making delivering arrangements is called
Ans_ Procurement
640. All of the following are unique features of e-commerce technology except
Ans_ Universality
641. In the ___ revenue models, a firm offers some services for free but charges a subscription fee
for premium services
Ans_ Free/freemium
642. In planning a robust e-commerce presence, you will want to consider the blog platform as part
of your __ presence
Ans_ Social media
44
CHAPTER 11
644. What is the first value-adding step in the knowledge business value chain?
Ans_ Data and information acquisition
645. About ___ percent of the United States GDP is produced by the knowledge and information
sectors
Ans_ 45
646. Which type of intelligent agent models the behaviour of consumers, stock markets and more by
seeing them as autonomous agents that follow relatively simple rules for interaction?
Ans_ Agent-based modelling
647. Which of the following is not a typical componenet or capability of an enterprise content
management system?
Ans_ KWS
648. What types of intelligent technique help Procter & Gamble determine the most efficient
methods for their trucks to deliver goods?
Ans_ Intelligent agents
649. In content management once a taxonomy is developed documents must then be ___ with the
proper classification
Ans_ Tagged
651. Informal social networks of professionals and employees within and outside the firm who have
similar work-related activities and interests are called communities of
Ans_ Practice
652. Expertise of organizational members that has not been formally documented best describes
Ans_ Tacit knowledge
654. Specialized systems built for engineers, scientist and knowledge workers charged with
discovering and creating new knowledge for a company are called
Ans_ KWS
655. Which of the following statements is not an accurate descriptions of the importance of
knowledge to a firm?
Ans_ Knowledge is unconditional
45
CHAPTER 12
656. Which of the following is not one of the Simon’s four stages of decision making?
Ans_ Analysis
658. Which of the following types of systems would be used to present senior marketing executives
with in-depth information customer retention, satisfaction and quality performance?
Ans_ ESS
659. ____ are visual tools for presenting performance a data in a BI system
Ans_ Dashboards and scorecards
660. The role of liaison falls into which of Mintzberg’s managerial classifications?
Ans_ Interpersonal
661. ESS
Ans_ Have the ability to drilldown into lower levels of detail
662. Which type of decision is calculating gross pay for hourly workers?
Ans_ Structured
663. Which of the following systems support a manager’s role as leader of an organization?
Ans_ Telepresence systems
664. Which type of information systems uses data visualization technology to analyse and display
data for planning and decision making in the form of digitized maps?
Ans_ GIS
665. Which of the following is not one of the five observed ways in which managerial behaviour
differs from the classical description of managers?
Ans_ Mangers prefers regular, written reports on firm activities
666. When there is no well-understood or agreed-on procedure for making a decision, it is said to be
Ans_ Unstructured
CHAPTER 13
46
669. As a technical project manager you have decided to propose implementing a prototyping
methodology for a small Web-based design project. What is the order of steps you will follow in this
project?
Ans_ Identify user requirements develop the prototype, use the prototype, revise and enhance the
prototype
671. During the ____ stage of system development system specification that were prepared during
the design stage are trAnslated into software coded
Ans_ Programming
672. Compared to use of proprietary components, Web services promise to be less expensive and
less difficult to implement because of
Ans_ their ability to enable communication among different systems using universal standards
673. An upscale organic foods grocery chain is implementing an information system that will enable
it add same-day home delivery of groceries to its customers. This is an example of
Ans_ Paradigm shift
674. The process of creating workable information systems in very short period of time is called
Ans_ RAD
675. Categories of tools for BPM include all of the following except
Ans_ Tools to test the security of business processes
676. Which type of systems development is characterized by significantly up the design and the
generation of information requirements and involving users at an intense level?
Ans_ JAD
677. ____ Is the process of changing from the old system to the new system
Ans_ Conversion
CHAPTER 14
679. The ___ consists of systems analysts, specialists from the relevant end-user business areas,
application programmes and perhaps database specialists
Ans_ Project Team
681. Which of the following statement best describes that effect that project structure has on overall
project risks?
Ans_ Projects with relatively undefined goals are more likely to be subjected to users changing
requirements and to run a high risk of not satisfying project goals
47
682. An example of using an external integration tool would be to
Ans_ Include user representatives as active members of the project team
683. External integration tools
Ans_ Consists of ways to link the work of the implementation team with users at all organization
levels
684. You have been hired by a pharmaceutical company to evaluate its inventory of systems and IT
projects which types of projects would be best avoided?
Ans_ All high-risk. Low-benefit projects
685. Which of the following is not one of the activities of the systems analyst?
Ans_ Formulation of capital budgeting models
687. A road map indicating the direction of systems development rationale the current systems new
developments to consider the management strategy the implementation plan and the budget is called
a(n)
Ans_ Information system plan
CHAPTER 15
689. A critical necessity for ensuring the integration of local system into a global system is
Ans_ Adherence to data and technical standards
692. The network systems structure is the most visible in ___ services
Ans_ Financial
694. In term of global business strategy, the governance of __- firms has been likened to a federal
structure-strong central management of decision making, but considerable dispersal of power and
financial resources
Ans_ Transnational
695. In co-optation
Ans_ Opponents to a planned global system are brought into the process of designing and
implementing the solution
696. Which of the following is not the main organizational issues facing who are seeking to
globalize?
48
Ans_ defining the global environment
697. A force in the environments to which businesses must respond and that influences the direction
of the business is called a business
Ans_ Driver
698. Global coordination of all of the major business functions permits the location of business
activity according to
Ans_ Comparative advantage
CHAPTER 7
699. Which type of network would be most appropriate for business that comprised three employees
and a manager located in the same office space, whose primary need is to share document?
Ans_ Peer-to-Peer network
700. VPN
Ans_ Is an encrypted private network configured within a public network
701. A(n)___ is a box consisting of a radio receiver/transmitter and antennas that links to a wired
network, router, or hob
Ans_ Access point
703. Shopping bots use ___ software for searching the internet
Ans_ Intelligent agent
CHAPTER 8
705. Electronic data are more susceptible to destruction, fraud, error and misuse because
information systems concentrate data in computer file that
Ans_ May be accessible by anyone who has access to the same network
707. ___ refers to policies procedures and technical measures used to prevent unauthorized access
alteration theft or physical damage to information systems
Ans_ Security
CHAPTER 9
49
709. Operational CRM applications include tools for
Ans_ Saleforce automation
710. The measurement of the number of customers who stop using or purchasing products or
services from a company is called
Ans_ Chun rate
711. Next-generation enterprise suites use ___ and SOA to link systems of customers and suppliers
Ans_ Web services
712. As they move through the supply chain __ are transformed into finished products and shipped
to retailers and customers
Ans_ Raw materials
713. Customer relationship management systems typically provide software and online tool for
sales, customer service and
Ans_ Marketing
714. A company’s suppliers, supplier’s suppliers and the processes for managing relationships with
them is the
Ans_ Upstream portion of the supply chain
715. Selling a customer with a checking account a home improvement loan ia an example
Ans_ Cross-Selling
CHAPTER 10
719. Which of the following is a marketing format that uses banner ads and pop-ups with interactive
features?
Ans_ Display ads
721. Which of the following best illustrates the sales revenue model?
Ans_ Apple accepts micropayments for single music track downloads
50
722. Netflix’s public announcement of reward for technology solution to it movie recommendation
is an example of
Ans_ Crowdsourcing
723. Which of the following best describes the digital social graph?
Ans_ A mapping of all online social relationships
724. Which of the following is not one of four types of presence to be considered when building an
E-commerce presence?
Ans_ Corporate
725. Experts systems are expensive and time consuming to maintain because
Ans_ their rule must be reprogrammed every time there is a change in the environment which in turn
may change the applicable rules
726. The terms used in a fuzzy logic system to describe imprecise states or conditions are referred to
as
Ans_ membership functions
728. Which of the following systems digitizes and tags documents according to a coherent
framework?
Ans_ Document management
CHAPTER 11
729. _____ seeks to enhance human perception by combining a live direct view of the physical
world with computer-generated images
Ans_ AR
731. To automate routine tasks to help firms for and filter information for use in electronic
commerce and supply chain management a firm would most likely use
Ans_ Intelligent agents
CHAPTER 12
733. A(n)___ report is produced when a user enters various values in a pivot table to filter data
Ans_ Parameterized
734. The dimension of ___ describes whether the structure of data is consistent within an
information source
Ans_ Integrity
51
735. Which of the following are most likely to reply primarily on the drill-down functionality of BI
for their decision-making needs?
Ans_ Middle managers
737. Which of the following statements best describes the term business intelligence?
Ans_ the infrastructure for collecting and managing business data
738. Measure defined by management and used to internally evaluate the success of a firm’s
financial business process, customer and learning and growth are called
Ans_ KPIs
CHAPTER 13
741. ___ development focuses on rapid delivery of working software by breaking a large project
into a series of small sub-projects that the completed in short periods of time using iteration and
continuous feedback
Ans_ Agile
742. You are an IT project manager for an advertising firm. The firm wishes to create an online tool
that will be used to survey focus group reactions to products in development. The most important
consideration for the firm is being able to offer
The tool as soon as possible as new corporate service. However, you know that many of the senior
managers that are business owners of this project have difficulty in understanding technical or
software development issues and are likely to change their requirements during the course of
development. What development method would be most successful for this project?
Ans_ Prototyping
743. ___ describe the transformation occurring within the lowest level of the data flow diagrams
Ans_ Process specifications
744. A(n)__is the model or blueprint for an information system and consists of all the specifications
that will deliver that functions identified during systems analysis
Ans_ System design document
CHAPTER 14
745. The organizational activities working towards the adoption, management and routinization of a
new information system are called
Ans_ Implementation
52
746. To best evaluate, from a financial standpoint, an IT investment whose benefits established in
advance you would use
Ans_ The real option pricing model
747. All of the following are indications of a failed information systems project except
Ans_ Employees require training to properly use the system
748. You have been hired to implement an enterprise system that will automate much of the billing
and accounting work for a state wide HVAC services company; which of the following would you
prepare to describe how the new system will affect a firm’s structure and operations?
Ans_ Organisational impact analysis
751. Which of the following is not one of the principal problems of international networks?
Ans_ Network standards
752. From your reading of the chapter case, which of the following best describes the challenge
Unilever was facing as a global company?
Ans_ Too many systems in too many data centres, making it difficult to process transactions in timely
fashion
753. The chapter outlines four steps in developing an effective global system solution. Which of the
following is not one these steps?
Ans_ Identify out-dated legacy systems to be replaced
756. The major dimensions of international systems architecture include each of the following
except
Ans_ Transborder data flows
757. From your reading of the Scott’s Miracle-Gro case study the company implemented SAP and
JDA enterprise and supply chain planning systems to solve what problems?
Ans_ Coordination issues caused by the merge of Scott’s and Miracle-Gro
758. Supply chain planning system perform all the following functions except
Ans_ Track the physical status of goods
53
761. ____ systems are based on a suite of software models used to support business activities across
the firm
Ans_ Enterprise
762. Goods that area involved in the actual production process are referred to as
Ans_ Direct goods
763. Which of the following best illustrates the transaction free revenue model?
Ans_ eBay receives a small fee from a seller if seller is successful in selling an item
766. Systems that integrate different type of techniques such as genetics algorithms fuzzy logic
neural networks and expert’s systems into a single application are called ___ systems
Ans_ Hybrid AI
768. Your company wants to develop intelligent techniques to create a ‘smart’ oven that can
perfectly cook basic foodstuff, such as roasts and bread using sensors and minimal input from the user.
The system would know the difference between rare medium rare, medium, and well done roasts. The
category of intelligent technique that would describe this system is
Ans_ Fuzzy logic
771. Which of the following is not one of the six main analytic functionalities of BI systems for
helping decision makers understand information and take action?
Ans_ Business case archives
772. All of the following managerial roles can be supported by information systems except
Ans_ Entrepreneur
773. A(n)____ facilitates the solution to unstructured problems by a set of decision makers working
together as a group
Ans_ GDSS
774. In automation
Ans_ Employees are enabled to perform their tasks more efficiently
775. Which of the following is not a top priority in mobile application development?
Ans_ Designing for keyboard data entry
54
776. The entire system-building effort is driven by
Ans_ User information requirements
777. In an object-oriented development framework for a university, how would the classes Degree
Mathematics and physics be related?
Ans_ Degree is a superclass to Mathematics and Physics
778. In working with ROPMS (real option models) and options valuation, a call option is a(n)
Ans_ Right to purchase or sell an asset at later date at a fixed price
783. In developing countries, use of the internet is limited by all the flowing except
Ans_ Use of mobile telephones
784. Which of the following is not one of the system configurations used by global firms?
Ans_ networked
786. Which of the following statement best describes the relationship between collaboration and
knowledge management?
Ans_ knowledge is useful only when shared with others
787. The set of business processes, culture, and behaviour required to obtain value from investment
in information systems is one type of
Ans_ Organizational and management capital
790. Which of the following BI tools or abilities have been driving the movement toward ‘smart
cities?’
Ans_ big data analytics
791. What is the primary driving factor in firms to select domestic outsourcing firms to build system
solutions?
Ans_ to take advantage of technical skills the firm does not have
55
792. _____ provide(s) a methodology and tools for dealing with the organization’s ongoing need to
revise and optimize its numerous business processes
Ans_ Business process management
793. A software package evaluation process is often based on a series of questions sent to vendors,
called a(n)
Ans_ Request for proposal
795. The _____ reviews and approve plans for system in all divisions
Ans_ IS steering committee
796. The worth of systems from a financial perspective essentially revolves around the issues of
Ans_ Return on invested capital.
797. Which type of systems are widely used by manufacturing and distribution firms to connect to
suppliers on a global basis?
Ans_ EDI systems
799. Which of the following in not of the main four dimensions of knowledge described in the
chapter?
Ans_ Knowledge is timeless
800. _______ often are designed and optimized for the specific tasks to be performed.
Ans_ Knowledge work stations
801. BI that is designed to determine the most likely effects of changes in the business environment
is called
Ans_ Predictive analytics
802. Which of the following companies is not one of the top five producers of business intelligence
and analytics products?
Ans_ Sun
803. A systems analysis includes a(n) ______ that is used to determine whether the solution is
achievable, from a financial, technical and organisational standpoint.
Ans_ Feasibility study
804. The primary tools for representing a systems’ component processes and the flow of data
between them is the
Ans_ Dataflow diagram
805. To Review a project’s tasks and their interrelationships, you would use a
Ans_ PERT chart
56
806. The central method used in a scoring model is to
Ans_ Perform a weighted comparison of the criteria used to evaluate a system
807. Which of the following is not an important technology issued to consider when developing an
international information system?
Ans- Deciding how mobile computing will fit into your international system
811. High-velocity decision making systems are growing rapidly for decisions classed as
Ans_ Highly structured
812. A(n) ______ is an organizational change that involves rethinking the nature of the business of
the business and the nature of the organisation itself.
Ans_ Paradigm shift
813. ROPMs (real options pricing models) valued information systems similar to stock options, in
that
Ans_Intial expenditures on IT projects are seen as creating the right to pursue and obtain benefits from
the system at a later date.
814. As a firm moves from local options systems to regional and global systems
Ans_ Agency costs increase.
815. An information system for a building company that tracks construction costs for various
projects across the United States would be categorized as a type of
Ans_ MIS
816. To show each level of a systems’ its relationship to other levels, and its place in the overall
design structure, structured methodologies use
Ans_ Structure Charts
817. Which type of planning tools shows each task as a horizontal bar whose length is proportional
to the time required to complete it?
Ans_ Gantt chart
818. Which of the following is not an important factor when implementing a global information
system solution?
Ans_ Understanding if your computer system can operate in a global environment
820. A global firm can develop transnational centres of excellence as an effective technique to
Ans_ Effectively identify global business processes
57
821. The four kinds of structural organisational changed enabled by IT, in order form least to most
risky, are
Ans_ automation, rationalization, redesigned and paradigm shift
822. Japanese consumers who only want to purchase products made in Japan are an example of
Ans_ Cultural particularism
824. Which of the following is not a specific challenge to global business systems?
Ans_ Cultural expectations
826. Transnational companies have tended to use a(n) ______ system configuration.
Ans_ Networked
828. In terms of global business strategy and structure, a franchise company will use a policy of
Ans_ Dispersed production, marketing and human resources, with centralized strategic management
and finance/accounting.
830. To avoid the cost and uncertainty of moving information across national boundaries, most
multinational firms
Ans_ Develop separate systems within each country.
833. Transferring data from a legacy system to the new system would be defined by which category
of system design specifications?
Ans_ Conversion
834. Global markets, production, and administration create the conditions for.
Ans_ Global economies of scale
835. All of the following present challenges to developing global business systems except
Ans_ Production costs
836. When developing a global system, bringing the opposition of local groups into the process of
designing and implementing the solution without giving up control over the direction and nature of the
change is called
Ans_ Cooptation
58
837. In relation to global systems building, the Internet
Ans_ Has reduced networking problems.
839. Making judgments and taking action on the basis of narrow or personal characteristics is
referred to as
Ans_ Particularism
840. Of the following, which is one of the central principles recommended in this chapter for a firm
organizing itself for international business?
Ans_ Organize value-adding activities along lines of comparative advantage.
841. What are the main changes taking place in organisational use of information systems? Which
of these do you think is having the greatest impact on businesses?
Ans_ True
842. Apex Vacuum, a family-owned manufacturer of budget vacuums, has grown exponentially
over the last few years. However, the company is having difficulty preparing for future growth. The
only information system used at Apex is an antiquated accounting system. The company has one
manufacturing plant located in ArkAnsas, and three warehouses, in Arkansas, Delaware, and
California. The Apex sales force is national, and Apex purchases about a third of its vacuum parts and
materials from a single oversea supplier. You have been hired to recommend the information systems
Apex should implement in order to maintain their competitive edge. However, there is not enough
money for a full-blown, cross-functional enterprise application, and you will need to limit the first step
to a single functional area or constituency. What will you choose, and why?
Ans_ True
843. You are advising the owner of Smalltown Computer, a new local computer repair store that
also builds custom computers to order. What competitive strategies could Smalltown Computer exert?
Which ones will it have difficulty exercising?
Ans_ True
845. Distinguish between cloud computing, green computing and quantum computing.
Ans_ True
847. How are RFID systems used in inventory control and supply chain management?
Ans_ True
848. How is the security of a firm’s information system and data affected by its people, organization
and technology? Is the contribution of one of these dimensions any more important than the other?
Why?
Ans_ True
59
849. Identify two supply chain models. Which is better?
Ans_ True
850. What is the most profound way in which e-commerce and the Internet have changed the
relationship between companies and their customers? Support your Answer.
Ans_ True
60