Thursday 31 May 2012

A______ handles the day-to-day, routine, repetitive


A _______________ handles the day-to-day, routine, repetitive tasks that are essential to the operation of the organization.  Activities supported include the monitoring, collection, storage, processing and dissemination of the organization’s basic business transactions.
a. transaction processing system
b. management information system
c. knowledge management system
d. office automation system


_ includes the system hardware, development software, networks and communications


_ includes the system hardware, development software, networks and communications facilities, databases, and information systems personnel. 
a) Physical data model
b) Information infrastructure
c) Systems architecture
d) Information architecture
e) Logical data model


__ is the high-level map or plan of the information requirements of an organization,


_____ is the high-level map or plan of the information requirements of an organization, which is used to guide current operations andplan future ones.  
a) Information infrastructure
b) Conceptual data model
c) Logical data model
d) Information technology architecture
e) Tele-Info architecture
 

The part of the supply chain which is mainly concerned with production management,


The part of the supply chain which is mainly concerned with production management, manufacturing, and inventory control is:
a) downstream.
b) midstream.
c) upstream.
d) internal.
e) cross stream.

The _______________ part of the supply chain includes


The _______________ part of the supply chain includes the activities of a manufacturing company with its first-tier suppliers (which can be manufacturers and/or assemblers) and their connection to their second-tier suppliers. 
a) downstream
b) midstream
c) upstream
d) internal
e) none of the above 

The most traditional model of client server computing uses the


The most traditional model of client server computing uses the _______________ to act as a database server providing data for analysis done by the PC clients using spreadsheets, database management systems, and application software.
a) personal computer 
b) mainframe
c) mini computer
d) super computer
e) micro computer

__ are self-contained, self-describing business


___ are self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device, ranging from personal computers to mobile phones. 
a) XML  
b) Web Services
c) Object Services
d) Information Services
e) HTML 

What information does a person or an organization have a right or a privilege to obtain,


 What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards is part of this ethical issue? 
A. Privacy 
B. Accuracy 
C. Accessibility 
D. Perfection 
E. Propert

This ethical theory states that managers are entrusted with a fiduciary responsibility


This ethical theory states that managers are entrusted with a fiduciary responsibility to all those who hold a stake in or a claim on the firm . 
A. Stockholder theory 
B. Stakeholder theory 
C. Property theory 
D. Fiduciary theory 
E. Normative theory 

This is a piece of data that is stored on the users computer


This is a piece of data that is stored on the users computer by a company that the user accesses using a web browser? 
A. Script 
B. Cookie 
C. Data-Link File 
D. DLL File 
E. Data file 

The information systems planning process proceeds in which order?


The information systems planning process proceeds in which order? 
A. Organization mission organization strategic plan IS strategic plan new IT architecture 
B. Organization mission IS strategic plan organization strategic plan IS operational plan 
C. Organization strategic plan organization mission IS strategic plan new IT architecture 
D. IT architecture IS strategic plan organization strategic plan organization mission 
E. IS development projects IS operational plan new IT architecture organization mission 
 

The _____ that changes are made in the systems development life cycle,


The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become. 
A. sooner, less 
B. later, less 
C. more frequently, more 
D. more extensively, more 
E. sooner, more 

_ provides users with a view of what is happening, where _____ addresses why it is happening.


__ provides users with a view of what is happening, where _____ addresses why it is happening. A. Multidimensional data analysis, structured query language 
B. Data mining, multidimensional data analysis 
C. Data mining, expert system 
D. Multidimensional data analysis, neural networks 
E. Multidimensional data analysis, data mining 
  

Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment.


Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment. 
A. less, decreased 
B. more, decreased 
C. less, increased 
D. more, increased 
E. about the same, decreased 

By 1998, approximately _____% of companies with


By 1998, approximately _____% of companies with annual revenues greater than $1 billion has installed ERP systems. 
A. 20 
B. 25 
C. 30 
D. 35 
E. 40 

These are comprehensive software packages that incorporate all modules needed


These are comprehensive software packages that incorporate all modules needed to run the operations of a business. They should include the following modules: Manufacturing, Accounting, Human resources and Sales. 
A. BRP systems 
B. Groupware system 
C. ERP systems 
D. TQM systems 
E. BBB systems 
  

In this business structure a common view of a firm is


In this business structure a common view of a firm is as a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon. 
A. Technology 
B. Business reengineering approach 
C. Silo 
D. Process Control 
E. Business process 

This is defined as the available data, technology, people, and processes within an organization?


This is defined as the available data, technology, people, and processes within an organization? 
A. Information Management 
B. Information Technology 
C. Information Systems 
D. Information Resources 
E. Information Networks 

Which era of information resources focused primarily on


 Which era of information resources focused primarily on effectiveness such solving problems and creating opportunities? 
A. 1960s 
B. 1970s 
C. 1980s 
D. 1990s 
E. 2000+ 
 

Supply chain complexity and scale:


Supply chain complexity and scale: 
A. Affect both very small companies and large, global organizations 
B. Were difficult to address before the Internet 
C. Result when firms product complex products and services 
D. Result when firms implement full-scale, supply chain management systems 
E. Result when companies implement extranets and EDI 
 

If you buy a science fiction book from Amazon.com,


 If you buy a science fiction book from Amazon.com, the company s software will automatically recommend similar books bought by other readers. This is an example of: 
A. cross-selling 
B. up-selling 
C. one-to-one marketing 
D. viral marketing 
E. permission marketing 
  

Enterprise resource planning systems are very _____ software products,


Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions. 
A. unstructured, business processes 
B. structured, reporting relationships 
C. structured, accounting processes 
D. unstructured, inventory control 
E. structured, processes` business 

Technology has significantly changed the way work is done and how managers interact with employees.


Technology has significantly changed the way work is done and how managers interact with employees. One technological solution helps to solve the problem of lack of direct supervision by permitting managers to monitor employees based on ________________________ compensation strategies. 
A. valued added work 
B. pay for performance 
C. team work 
D. work performance 
E. piece work performance 

In the _____ B2B application, the orders of many buyers are


In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention. 
A. buy-side 
B. sell-side 
C. auctions 
D. group purchasing 
E. electronic exchange 

The advantages of B2C for consumers include all of the following except:


The advantages of B2C for consumers include all of the following except: 
A. You can buy from home 24 hours per day, 7 days per week. 
B. You have a wider variety of products to choose from. 
C. You typically cannot access additional information, so you do not have information overload. 
D. You can easily compare prices and features. 
E. You can find unique items. 

Electronic commerce provides opportunities to do all of the following except:


 Electronic commerce provides opportunities to do all of the following except: 
A. For companies to expand their reach 
B. For companies to expand at relatively high cost 
C. For companies to put rich information on their Web sites 
D. For companies to increase market share 
E. For companies to adopt new business models 

The data in a data warehouse have which of the following characteristics?


The data in a data warehouse have which of the following characteristics? 
A. are organized by subject 
B. are coded in different formats 
C. are updated in real time 
D. are typically retained for a defined, but limited, period of time 
E. are organized in a hierarchical structure 



Solution 

You have moved to a different apartment,


You have moved to a different apartment, but your electricity bill continues to go to your old address. The Post Office in your town has a problem with its data management, which is: 
A. Data redundancy 
B. Data inconsistency 
C. Data isolation 
D. Data security 
E. Data dependence 
 

Which of the following statements about Wi-Fi is not correct?


Which of the following statements about Wi-Fi is not correct? 
A. Wi-Fi provides simple Internet access. 
B. Laptop PC scan contain chips that can send and receive Wi-Fi signals. 
C. Many companies offer free Wi-Fi access in their stores. 
D. Wi-Fi requires encryption for secure transmissions. 
E. Wi-Fi is expensive to set up. 
 

Of the following, which is the major problem with smart phones?


Of the following, which is the major problem with smart phones? 
A. They are too slow. 
B. They are too expensive. 
C. They can be used to compromise security. 
D. Their screens are too small. 
E. Their browsers are not fully functional. 

Individuals are finding it convenient and productive to use wireless


Individuals are finding it convenient and productive to use wireless devices for which of the following reasons? 
A. To make use of time that was formerly wasted 
B. To become more efficient 
C. Work locations are more flexible 
D. To be able to allocate working time around personal and professional obligations 
E. All of the above 
 

Your company s computers have been taken over by an attacker and


Your company s computers have been taken over by an attacker and used to attack other organization s information systems. Your problem is which of the following? 
A. poor security policies and procedures 
B. lack of due diligence 
C. downstream liability 
D. poor service-level agreements 
E. users have a lack of information security awareness 
 

Which of the following statements is correct?


Which of the following statements is correct? 
A. An individual s right to privacy is absolute. 
B. It is difficult to determine and enforce privacy regulations. 
C. An individual s right to privacy supersedes the needs of society. 
D. Advances in information technologies have not affected individual privacy. 
E. The Internet has increased individuals privacy. 
 

What is _____ is not necessarily _____.


What is _____ is not necessarily _____. 
A. Illegal, unethical 
B. Ethical, illegal 
C. Unethical, illegal 
D. Unethical, legal 
E. Ethical, legal 


Solution

Managers want to analyze the costs of informal support of their IT infrastructure for two reasons:


Managers want to analyze the costs of informal support of their IT infrastructure for two reasons: the costs and the ____________________________. 
A. time to fix a problem 
B. effect the support activity has on morale 
C. quantity of informal support activity 
D. the quality of the informal support activity 
E. relative need across the company 


This financial calculation provides a percentage rate that measures


This financial calculation provides a percentage rate that measures the relationship between the amount the business gets back from an investment and the amount invested. 
A. IRR 
B. ROI 
C. Payback 
D. NPV 
E. EVA 

This counts the actual activities that go into making a specific product


This counts the actual activities that go into making a specific product or delivering a specific service. 
B. Focused Based Costing 
C. Activity Based Costing 
D. Unit Based Costing 
E. Activity Induced Costing 
Solution

Any systems acquisition effort is mainly driven by


Any systems acquisition effort is mainly driven by 
A. organizational change 
B. feasibility studies 
C. data needs 
D. user information requirements 
E. corporate strategy 
   

Wednesday 30 May 2012

It is very difficult to manage data for which of the following reasons?

You have moved to a different apartment, but your electricity bill continues to go to your old address. The Post Office in your town has a problem with its data management, which is:
A. Data redundancy
B. Data inconsistency
C. Data isolation
D. Data security
E. Data dependence
 

General managers should take an active role in decisions about information systems.

General managers should take an active role in decisions about information systems. This is vital because of which one of the following reasons?
A. IS cannot be trusted to make good decisions.
B. IS staff has not been trained to make general business decisions.
C. IS personnel do not have the companies best interests as their focus
D. IS systems are designed to support business decisions.
E. IS systems are normally incongruent with business goals.
 

The business diamond is useful for designing new


The business diamond is useful for designing new organizations and diagnosing organizational troubles. Which component of the business diamond would include payroll, accounting, and inventory?
A. Business Processes
B. Values and Beliefs
C. Tasks and Structures
D. Business Levers
E. Management Systems

The ______________________ holds that the timing of the user of

The ______________________ holds that the timing of the user of specialized knowledge can create a differentiation advantage as long as the knowledge remains unique.
A. stakeholder s model
B. shareholder value model
C. customer relationship model
D. stockholder share model
E. unlimited resources model

The _____ is a global wide-area network that connects approximately


The _____ is a global wide-area network that connects approximately one million organizational computer networks.
A. global network
B. extranet
C. Internet
D. intranet
E. World Wide Web
 

Applications offered by the Internet include which of the following?

Applications offered by the Internet include which of the following?
A. remote diagnosis
B. digital libraries
C. distance education
D. virtual laboratories
E. all of the above

Which of the following is not an advantage of open-source software?

Which of the following is not an advantage of open-source software?
A. Produces high quality code
B. Produces code that can be changed to meet the needs of the users
C. Bugs are discovered quickly
D. Support available only through online communities of core developers
E. Produces reliable code
 

Which of the following is not an overall trend in software?

Which of the following is not an overall trend in software?
A. Increased complexity
B. Increased cost
C. Increased number of errors
D. Increased amount of mainframe software written by users
E. Increasingly large percentage of information systems costs

Which of the following is a traditional, major IS function?

Which of the following is a traditional, major IS function?
A. Managing systems development
B. Partnering with the firm s executives
C. Managing outsourcing
D. Educating non-IS managers about IT
E. Incorporating the Internet and electronic commerce into the business

Which of the following statements about information systems is not correct?

 Which of the following statements about information systems is not correct?
A. Information systems are concentrated in the IS Department.
B. Information systems tend to follow the structure of the organization.
C. Information systems are based on the needs of employees.
D. Any information system can be strategic.
E. Managing information systems is difficult.

Amazon is using its IT infrastructure to deliver a variety of services

Amazon is using its IT infrastructure to deliver a variety of services for all of the following reasons except:
A. because the company only uses 10 percent of its processing capacity at any one time
B. to stabilize profits and revenue
C. to compete with Google
D. to help start-up companies with their IT needs

NAME____ IT personnel use _____ to produce _____.

NAME_____________________________
1. IT personnel use _____ to produce _____.
A. IT components, IT services
B. Computer-based information systems, IT architecture
C. IT infrastructure, IT architecture
D. IT infrastructure, IT platform

The computing skills necessary to be a hacker are decreasing for which of the following reasons?

The computing skills necessary to be a hacker are decreasing for which of the following reasons?
A.Computer attack programs, called scripts, are available for download from the Internet.
B.More IS and computer science departments are teaching courses on hacking, so their graduates can recognize attacks on information assets.
C.Cybercrime is much more lucrative than regular white-collar crime.
D.International organized crime is training hackers.

issues involve the authenticity and fidelity of information that is collected and processed.

__ issues involve the authenticity and fidelity of information that is collected and processed. 
A.Accuracy
B.Privacy
C.Property
D.Transferability
 

__ involves building an inappropriate trust relationship with employees

__ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.
A.Hacking
B.Reverse social engineering
C.Social engineering
D.Spoofing
 

Of the following, which is the major problem with smartphones?

Of the following, which is the major problem with smartphones?
A.They are too expensive.
B.They are too slow.
C.Their screens are too small.
D.They may be used to compromise security.

Problems in Procter and Gamble®’s distribution network included all of the following except

Problems in Procter and Gamble®’s distribution network included all of the following except:
A.Some stores received no product at all.
B.Some stores received too much product.
C.The RFID tags generated too much data.
D.Some displays never were shown on the retail floor.

Which of the following systems acquisition methods is time-consuming

Which of the following systems acquisition methods is time-consuming, costly, and may produce excessive documentation?
A.Prototyping
B.End-user development
C.External acquisition
D.Traditional systems development life cycle
 

The _____ that changes are made in

The _____ that changes are made in the systems development life cycle, the _____ expensive the changes become.
A.later, less
B.more frequently, more
C.more extensively, more
D.sooner, less
 

Which of the following systems acquisition methods results in

 Which of the following systems acquisition methods results in software that may be tried out, has been used for similar problems in other organizations, and can save time?
A.Prototyping
B.End-user development
C.Buy option
D.Systems development life cycle

Computer support is greatest for which of the following problems

Computer support is greatest for which of the following problems? 
A.Unstructured and operational control
B.Structured and operational control
C.Semistructured and management control
D.Semistructured and strategic planning
 

Which of the following is not a characteristic of a structured decision?

Which of the following is not a characteristic of a structured decision?
A.Repetitive
B.No human intuition involved
C.Fuzzy and complex
D.Routine
 

___ is the efficient and effective execution of specific tasks.

_ is the efficient and effective execution of specific tasks. 
A.Management control
B.Strategic planning
C.Expertise
D.Operational control

The _____ method measures the effectiveness of management

The _____ method measures the effectiveness of management in generating profits with its available assets.
A.cost-benefit analysis
B.return on investment
C.internal rate of return
D.net present value

The IS planning process proceeds in which order?

The IS planning process proceeds in which order?
A.Organization mission, IS strategic plan, organization strategic plan, IS operational plan
B.Organization strategic plan, organization mission, IS strategic plan, new IT architecture
C.IT architecture, IS strategic plan, organization strategic plan, organization mission
D.Organization mission, organization strategic plan, IS strategic plan, new IT architecture

British Telecom® had all of the following problems with its IS function except

British Telecom® had all of the following problems with its IS function except
A.The company had a highly centralized IS department.
B.Only 20 percent of the company’s technology initiatives had a definitive business purpose.
C.No technology initiatives were being tracked in any way.
D.The company had too many technology initiatives.

The functions of the dashboard at Eastern Mountain Sports® include all of the following except

The functions of the dashboard at Eastern Mountain Sports® include all of the following except
A.Provide high-level view of key performance indicators
B.Provide drill-down capability to access details
C.Provide information relevant to company goals
D.Manage the volume of transactions
A.Provide high-level view of key performance indicators
B.Provide drill-down capability to access details
C.Provide information relevant to company goals
D.Manage the volume of transactions

In the _____ phase of the decision-making process,

In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem.
A.choice
B.design
C.intelligence
D.implementation

__ is the process by which organizational goals are achieved

__ is the process by which organizational goals are achieved through the use of organizational resources.
A.Operations
B.Organizational strategy
C.Management
D.Organizational decision-making

Packaging, assembly, or manufacturing take place in which segment of the supply chain?

Packaging, assembly, or manufacturing take place in which segment of the supply chain?
A.Internal
B.Downstream
C.External
D.Upstream
 

A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:

A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:
A.External supply chain
B.Upstream portion of the supply chain
C.Downstream portion of the supply chain
D.Suppliers’ chain

The _____ refers to erratic shifts in orders up and down the supply chain.


The _____ refers to erratic shifts in orders up and down the supply chain.
A.supply forecast effect
B.bullwhip effect
C.demand forecast effect
D.inventory effect

Supply chain complexity and scale:


Supply chain complexity and scale:
A.Were difficult to address before the Internet
B.Result when firms product complex products and services
C.Affect small companies and large, global organizations
D.Result when firms implement full-scale, supply chain management systems
 

Which of the following is not a goal of supply chain management?

Which of the following is not a goal of supply chain management?
A.Decrease inventory levels
B.Increase cycle time
C.Reduce uncertainty along the supply chain
D.Improve customer service