Bis 219 final exam | Business & Finance homework help

1. To survive and succeed in the New Economy, Orbis Inc.’s supply chain model was transformed from a:

a) hub-like supply chain to a linear supply chain.

Don't use plagiarized sources. Get Your Custom Essay on
Bis 219 final exam | Business & Finance homework help
Just from $13/Page
Order Essay

b) linear supply chain to a hub-like supply chain.

c) multiple layer supply chain to a single layer supply chain.

d) single layer supply chain to a multiple layer supply chain.

e) spoke like

 

2. An office supply broker combines orders from fifteen small offices into a single order, which results in a much lower price for each of the small offices due to volume discounts. This is an example of the _______________ EC business model.

a) dynamic brokering

b) group purchasing

c) reverse auctions

d) discount purchasing

e) none of the above

 

3. According to Metcalfe’s Law, the value of a network grows roughly by a power of _______________ of the number of its users (or nodes).

a) three

b) four

c) two

d) five

e) six

 

4. General Electric lists the specifications for a kind of wire needed in the manufacture of light bulbs on its Trading Process Network (TPN) site. GE asks potential suppliers to submit the price at which they would be willing to supply the wire. This is an example of a(n):

a) forward auction.

b) reverse auction.

c) private auction.

d) independent auction.

e) none of the above

 

5. Characteristics of a digital economy include all of the following EXCEPT:

a) a vast array of digitizable products like databases, news, information, books, and musical CDs

b) consumers and firms conducting financial transactions digitally

c) physical good such as home appliances and automobiles embedded with microprocessors and networking capabilities

d) elimination of all traditional intermediaries

e) decrease of geographic boundaries

 

6. Which of the following is NOT an example of a major type of business pressure on companies?

a) A homogenous workforce

b) Powerful customers

c) Technological Innovation and Obsolescence

d) Social responsibility

e) Environmental Factors

 

7. Which of the following statements is NOT true?

a) Information technology can be viewed as a subsystem of an information system.

b) Information systems can be viewed as a subsystem of information technology.

c) Information technology refers to the technological side of an information system.

d) Information systems are information technology enabled business applications.

 

8. Which of the following statements about pervasive computing at Royal Mile Pub is NOT true?

a) The servers use specialized PDAs to take orders.

b) Training servers to use these specialized PDAs is the major challenge and takes time.

c) Thanks to the new computing system, servers can now spend more time on the floor with customers.

d) The new computing system saves the server several trips to the kitchen.

 

9. The major types of business pressures are categorized along the following lines:

a) market and technology pressures.

b) market and society pressures.

c) market, technology, and society pressures.

d) market, technology, and government pressures.

 

10. CRM stands for:

a) customer relationship management.

b) customer responsibility management.

c) customer reliability management.

d) consumer relational management.

e) customer reflexive monitoring.

 

11. _______________ are intra-organizational Web-based secure networks that facilitate information access and collaboration.

a) Extranets

b) Virtual Private Networks

c) Intranets

d) EDI networks

e) ERP

 

12. Businesses in an alliance may:

a) share resources.

b) establish permanent supplier-company relationships.

c) create joint research efforts.

d) all of the above

e) none of the above

 

 

13. “A set of programs that enable the hardware to process data” best describes:

a) software.

b) telecommuting.

c) virtual corporations.

d) database objects.

e) hardware.

 

14. Which of the following statements is NOT true about optical networks?

a) telecommunication networks that convert signals to colors of light and transmit these over fiber-optic filaments.

b) low capacity telecommunication networks

c) are suitable for video transmission

d) are suitable for multimedia interactions

e) are faster than analog

 

15. Which of the following statements is NOT true about a corporate portal?

a) It serves as a gateway to corporate data, information, and knowledge.

b) Only employees can access data through the portal.

c) Employees have a password that allows them to access data through the portal.

d) The corporate portal resembles a Web site.

e) It cannot be accessed off site.

 

16. Which of the following statements is NOT true about electronic marketplaces?

a) The stock exchange is an example of an electronic marketplace.

b) Chemconnect.com is an example of a horizontal marketplace.

c) These marketplaces provide operating efficiencies to trading.

d) These marketplaces can provide benefits to both buyers and sellers.

e) EBay is an example of an electronic marketplace.

           

17. A(n) _______________ refers to a company’s Web site that is used as a gateway to the corporate data, information, and knowledge.

a) URL

b) company network

c) intranet

d) corporate portal

e) Internet

 

18. The _______________ refers to an economy that is based on digital technologies, including digital communication networks (the internet, intranets, and private value-added networks or VANs), computers, software, and other related information technologies.

a) digital economy

b) Internet economy

c) web economy

d) electronic markets

e) all of the above

                       

19. _______________, a pioneer of computer networks, claimed that the value of a network grows roughly in line with the square of the number of its users (or nodes).

a) Robert Metcalfe

b) Bill Gates

c) Steve Jobs

d) Larry Ellison

e) none of the above

 

20. _______________ refers to the conduct of e-commerce via wireless devices.

a) E-commerce

b) L-commerce

c) M-commerce

d) I-commerce

e) B-commerce

           

21. Popularly called _______________ this prediction was that the processing power of silicon chips would double every 18 months. And so it has, resulting in enormous increases in computer processing capacity and a sharp decline in cost.

a) Kelly’s Extension to Metcalfe’s Law

b) Moore’s Law

c) Thomas’s Law

d) Anodyne’s Law

e) John’s Law

 

22. The collection of computing systems used by an organization is termed:

a)  intranet.

b)  extranet.

c)  information technology.

d) Internet.

e) information system.

 

23. A company that performs most of its business function electronically in order to enhance its operations and competitiveness is:

a) e-business.

b) electronic commerce.

c) information technology.

d) intranet.

e) brick and mortar.

 

24. A use of web-based systems to support buying selling and customer service exemplifies:

a) e-business.

b) e-commerce.

c) network.

d) distributed computing.

e) wolfbane cluster.

 

25. A(n) _________ connects computers and other electronic devices via telecommunication networks

a) intranet

b) Internet

c) networked computing

d) extranets

e) externet

 

26. Companies that link their intranets to those of their business partners over networks are called:

a) extranet.

b) intranet.

c) Internet.

d) computing.

e) network.

 

27. The global networked environment is called:

a) the Internet.

b) information technology.

c) e-business.

d) computing.

e) network computing.

 

28. The collection of hardware that comprise the computing systems used by an organization is termed:

a) information technology.

b) e-business.

c) computing.

d) none of the above

e) network.

 

29. The new digital economy is providing unparalleled opportunities for thousands of:

a) people.

b) states.

c) children.

d) entrepreneurs.

e) corporations.

 

30. A set of programs that instruct the hardware to process data is known as:

a) procedures.

b) information.

c) database.

d) software.

e) operating system.

 

 

31. What is a major capability of the information systems?

a) automate manually done tasks

b) automate both semiautomatic business processes and manually done tasks

c) increase effectiveness of people collaborating in groups

d) automate interpretation of vast business processes

e) none of the above

 

32. What is the difference between computers and information systems?

a) Computers process data and information systems utilize the processed data to solve some problem.

b) Computers and information systems are synonymous.

c) Computers are for word processing and professionals use information systems.

d) Computers can connect to the Internet whereas information systems can’t.

 

33. Which one of the following is not a characteristic of a smart appliance?

a) Smart appliances can be connected to the Internet to enhance their functions.

b) Smart appliances have voice recognition technology and can be verbally     commanded.

c) Smart appliances can be connected among themselves.

d) Smart appliances have increased capabilities through the use of technology.

e) none of the above

 

34. Digital economy is sometimes referred to all of the following except:

a) Internet economy.

b) technology economy.

c) new economy.

d) web economy.

e) information economy.

 

35. Which are the common types of files?

a) document files and worksheet files

b) database files and presentation files

c) Internet files and program files

d) a and b

 

36. The business environment consists of a variety of factors, which are:

a) social, technological, legal, economic, physical, and political.

b) religion.

c) culture.

d) computer skills and good knowledge of technology.

e) knowledge skills.

 

37. An extranet combines:

a) Internet with a business.

b) Internet with another Internet.

c) Internet with an extranet.

d) intranet with Internet.

e) electronic marketplace with intranet.

 

38. A(n) _______________ collects, processes, stores, and disseminates information for a specific purpose.

a) word bank

b) Internet

c) information system

d) data bank

e) data warehouse

 

 

 

1) The modern business environment has all of the following characteristics except:

A.        Interconnected

B.        Relatively static

C.        Global

D.        Competitive

 

 

2) _____ conveys understanding, accumulated learning, and expertise as they apply to a current problem.

A.        Information

B.        Experience

C.        Data

D.        Knowledge

 

 

3) The fact that you practice continuous computing means all of the following except:

A.        You can pull information about almost everything from anywhere all the time.

B.        Your daily routines are exactly the same as students 20 years ago, but you do your tasks much slower and with more effort.

C.        You are surrounded by a movable information network.

D.        You can push your ideas to the web.

 

 

4) Which of the following is not a major capability of IS?

A.        Provide fast, accurate communications among organizations

B.        Increase the effectiveness and efficiency of people working in groups

C.        Perform high-speed, high-volume numerical computations

D.        Store small amounts of information in a large space

 

 

5) A set of programs that enable hardware to process data is _____.

A.        software

B.        network

C.        hardware

D.        database

 

 

6) A collection of related files, tables, and so forth that stores data and the associations among them is _____.

A.        software

B.        network

C.        hardware

D.        database

 

 

7) You are registering for the next semester at your university. The combination of your previous experience registering, your major, the courses you need, the prerequisites for each course, the times you need for each course, the professors teaching each section, and your work schedule means that you are using _____ to select your class schedule.

A.        knowledge

B.        wisdom

C.        information

D.        expertise

 

 

8) _____ is data that have been organized to have meaning and value to a recipient.

A.        Information

B.        Experience

C.        Data

D.        Knowledge

 

 

9) _____ are the computer hardware, software, and communications technologies that are used by IT personnel to produce IT services.

A.        IT services

B.        IS

C.        IT components

D.        IT

 

10) What is the most significant benefit of Panasonic®’s new data management system?

A.        Improved time-to-market for products

B.        Company moved from push inventory model to pull model

C.        Cost savings

D.        Reduced time required for creating and maintaining product information

 

 

11) The end result of the data life cycle is the generation of _____.

A.        data

B.        wisdom

C.        information

D.        knowledge

 

 

12) Panasonic® wants to double its profit margins. What is the biggest problem Panasonic® has that could prevent attaining this goal?

A.        The company faces fierce global competition.

B.        The company faces rapid improvements in technology.

C.        The company cannot raise its prices.

D.        The company has inconsistent business information.

 

 

13) _____ occurs when the same data are stored in many places.

A.        Data integrity

B.        Data redundancy

C.        Data isolation

D.        Data consistency

 

 

14) _____ occurs when various copies of the data agree.

A.        Data integrity

B.        Data redundancy

C.        Data isolation

D.        Data consistency

 

 

15) In the data hierarchy, the smallest element is the _____.

A.        bit

B.        character

C.        record

D.        byte

 

 

16) The data in a data warehouse have which of the following characteristics?

A.        Coded in different formats

B.        Updated in real time

C.        Organized by subject

D.        Typically retained for a defined, but limited, period of time

 

 

17) _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.

A.        Secondary keys

B.        Duplicate keys

C.        Primary keys

D.        Attribute keys

 

 

18) In a database, the primary key field is used to _____.

A.        create linked lists

B.        identify duplicated data

C.        specify an entity

D.        uniquely identify a record

 

 

19) In this type of e-commerce, the sellers and buyers are organizations.

A.        Consumer-to-consumer

B.        Business-to-business

C.        Government-to-citizen

D.        Business-to-consumer

 

 

20) J&R Electronics®’ biggest problem was which of the following?

A.        The company had a limited range of products.

B.        The company had too many products, which confused customers with too many choices.

C.        The company was limited by its physical location.

D.        The company’s sales staff was not knowledgeable enough about the company’s products.

 

 

21) The nature of business competition is changing drastically as a result of all of the following except:

A.        The diversity of electronic commerce-related products and services

B.        The increase in the number of digitizable products

C.        New online companies

D.        Companies having difficulty integrating their physical and electronic channels

 

 

22) ERP systems are _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.

A.        structured, reporting relationships

B.        unstructured, inventory control

C.        unstructured, business processes

D.        structured, business processes

 

 

23) The characteristics of ERP systems include all of the following except:

A.        Provide information necessary to control the business processes of the organization

B.        Include a set of interdependent software modules

C.        Integrate the planning, management, and use of all resources of the organization

D.        Typically fit an organization’s existing business processes

 

 

24) International Game Technology® had all of the following problems that led to its implementing an ERP system, except:

A.        Applications were not integrated.

B.        A lack of useful information for managers.

C.        Each functional area had its own IS.

D.        The company could not manage the high volume of its transactions.

 

 

25) Which of the following is not a characteristic of a transaction processing system?

A.        Mainly internal sources of data

B.        Low computation complexity

C.        Small amounts of data processed

D.        High level of accuracy, data integrity, and security

 

 

26) Actions Toyota® workers may take with regards to problems on the assembly line include which of the following?

A.        They can call a supervisor.

B.        They can call a coworker.

C.        They cannot stop the assembly line.

D.        They can stop the assembly line.

 

 

27) Where possible, Toyota® uses all of the following to convey the status of work, except:

A.        Electronic dashboards

B.        Red/yellow/green lighting system

C.        Overhead displays

D.        Manual devices

 

 

28) You are in the market for a small economy car. The salesperson has you drive the economy car, and hands you the keys to a mid-size car of the same brand for you to drive. The salesperson is engaged in:

A.        Cross-selling

B.        Bundling

C.        Up-selling

D.        Customer relationship management

 

 

29) Which of the following is not a goal of supply chain management?

A.        Decrease inventory levels

B.        Increase cycle time

C.        Reduce uncertainty along the supply chain

D.        Improve customer service

 

 

30) Supply chain complexity and scale:

A.        Were difficult to address before the Internet

B.        Result when firms product complex products and services

C.        Affect small companies and large, global organizations

D.        Result when firms implement full-scale, supply chain management systems

 

 

31) The _____ refers to erratic shifts in orders up and down the supply chain.

A.        supply forecast effect

B.        bullwhip effect

C.        demand forecast effect

D.        inventory effect

 

 

32) A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:

A.        External supply chain

B.        Upstream portion of the supply chain

C.        Downstream portion of the supply chain

D.        Suppliers’ chain

 

 

33) Packaging, assembly, or manufacturing take place in which segment of the supply chain?

A.        Internal

B.        Downstream

C.        External

D.        Upstream

 

34) _____ is the process by which organizational goals are achieved through the use of organizational resources.

A.        Operations

B.        Organizational strategy

C.        Management

D.        Organizational decision-making

 

 

35) In the _____ phase of the decision-making process, managers examine a situation and identify and define the problem.

A.        choice

B.        design

C.        intelligence

D.        implementation

 

 

36) The functions of the dashboard at Eastern Mountain Sports® include all of the following except

A.        Provide high-level view of key performance indicators

B.        Provide drill-down capability to access details

C.        Provide information relevant to company goals

D.        Manage the volume of transactions

 

 

37) British Telecom® had all of the following problems with its IS function except

A.        The company had a highly centralized IS department.

B.        Only 20 percent of the company’s technology initiatives had a definitive business purpose.

C.        No technology initiatives were being tracked in any way.

D.        The company had too many technology initiatives.

 

 

38) The IS planning process proceeds in which order?

A.        Organization mission, IS strategic plan, organization strategic plan, IS operational plan

B.        Organization strategic plan, organization mission, IS strategic plan, new IT architecture

C.        IT architecture, IS strategic plan, organization strategic plan, organization mission

D.        Organization mission, organization strategic plan, IS strategic plan, new IT architecture

 

 

39) The _____ method measures the effectiveness of management in generating profits with its available assets.

A.        cost-benefit analysis

B.        return on investment

C.        internal rate of return

D.        net present value

 

 

40) _____ is the efficient and effective execution of specific tasks.

A.        Management control

B.        Strategic planning

C.        Expertise

D.        Operational control

 

 

41) Which of the following is not a characteristic of a structured decision?

A.        Repetitive

B.        No human intuition involved

C.        Fuzzy and complex

D.        Routine

 

 

42) Computer support is greatest for which of the following problems?

A.        Unstructured and operational control

B.        Structured and operational control

C.        Semistructured and management control

D.        Semistructured and strategic planning

 

 

43) Which of the following systems acquisition methods results in software that may be tried out, has been used for similar problems in other organizations, and can save time?

A.        Prototyping

B.        End-user development

C.        Buy option

D.        Systems development life cycle

 

 

44) The _____ that changes are made in the systems development life cycle, the _____ expensive the changes become.

A.        later, less

B.        more frequently, more

C.        more extensively, more

D.        sooner, less

 

 

45) Which of the following systems acquisition methods is time-consuming, costly, and may produce excessive documentation?

A.        Prototyping

B.        End-user development

C.        External acquisition

D.        Traditional systems development life cycle

 

50) Problems in Procter and Gamble®’s distribution network included all of the following except:

A.        Some stores received no product at all.

B.        Some stores received too much product.

C.        The RFID tags generated too much data.

D.        Some displays never were shown on the retail floor.

 

 

51) Of the following, which is the major problem with smartphones?

A.        They are too expensive.

B.        They are too slow.

C.        Their screens are too small.

D.        They may be used to compromise security.

 

 

52) _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

A.        Hacking

B.        Reverse social engineering

C.        Social engineering

D.        Spoofing

 

 

53) _____ issues involve the authenticity and fidelity of information that is collected and processed.

A.        Accuracy

B.        Privacy

C.        Property

D.        Transferability

 

 

54) The computing skills necessary to be a hacker are decreasing for which of the following reasons?

A.        Computer attack programs, called scripts, are available for download from the Internet.

B.        More IS and computer science departments are teaching courses on hacking, so their graduates can recognize attacks on information assets.

C.        Cybercrime is much more lucrative than regular white-collar crime.

 

D.        International organized crime is training hackers.

 

 

1.      NAME_____________________________

1. IT personnel use _____ to produce _____.

A. IT components, IT services

B. Computer-based information systems, IT architecture

C. IT infrastructure, IT architecture

D. IT infrastructure, IT platform

 

2. Amazon is using its IT infrastructure to deliver a variety of services for all of the following reasons except:

A. because the company only uses 10 percent of its processing capacity at any one time

B. to stabilize profits and revenue

C. to compete with Google

D. to help start-up companies with their IT needs

 

3. Which of the following statements about information systems is not correct?

A. Information systems are concentrated in the IS Department.

B. Information systems tend to follow the structure of the organization.

C. Information systems are based on the needs of employees.

D. Any information system can be strategic.

E. Managing information systems is difficult.

 

4. The Internet has had which of the following impacts on the way you purchase your textbooks?

A. The Internet gives you fewer choices.

B. The Internet increases your bargaining power.

C. The Internet provides you with less information.

D. The Internet decreases your bargaining power.

E. The Internet increases your switching costs.

 

5. Which of the following is a traditional, major IS function?

A. Managing systems development

B. Partnering with the firm s executives

C. Managing outsourcing

D. Educating non-IS managers about IT

E. Incorporating the Internet and electronic commerce into the business

 

6. Which of the following is not an overall trend in software?

A. Increased complexity

B. Increased cost

C. Increased number of errors

D. Increased amount of mainframe software written by users

E. Increasingly large percentage of information systems costs

 

7. Which of the following is not a characteristic of today s typical software?

A. Efficient

B. Full of errors

C. Poorly designed

D. Expensive

E. An art as well as a science

 

8. Which of the following is not an advantage of open-source software?

A. Produces high quality code

B. Produces code that can be changed to meet the needs of the users

C. Bugs are discovered quickly

D. Support available only through online communities of core developers

E. Produces reliable code

 

9. A(n) _____ is a network designed to serve the internal informational needs of a single organization.

A. global network

B. extranet

C. Internet

D. intranet

E. World Wide Web

 

10. Applications offered by the Internet include which of the following?

A. remote diagnosis

B. digital libraries

C. distance education

D. virtual laboratories

E. all of the above

 

11. The _____ is a global wide-area network that connects approximately one million organizational computer networks.

A. global network

B. extranet

C. Internet

D. intranet

E. World Wide Web

 

12. The ______________________ holds that the timing of the user of specialized knowledge can create a differentiation advantage as long as the knowledge remains unique.

A. stakeholder s model

B. shareholder value model

C. customer relationship model

D. stockholder share model

E. unlimited resources model

 

13. The business diamond is useful for designing new organizations and diagnosing organizational troubles. Which component of the business diamond would include payroll, accounting, and inventory?

A. Business Processes

B. Values and Beliefs

C. Tasks and Structures

D. Business Levers

E. Management Systems

 

14. General managers should take an active role in decisions about information systems. This is vital because of which one of the following reasons?

A. IS cannot be trusted to make good decisions.

B. IS staff has not been trained to make general business decisions.

C. IS personnel do not have the companies best interests as their focus

D. IS systems are designed to support business decisions.

E. IS systems are normally incongruent with business goals.

 

15. It is very difficult to manage data for which of the following reasons?

A. amount of data stays about the same over time

B. data are scattered throughout organizations

C. decreasing amount of external data needs to be considered

D. data security is easy to maintain

E. data are stored in the same format throughout organizations

 

16. You have moved to a different apartment, but your electricity bill continues to go to your old address. The Post Office in your town has a problem with its data management, which is:

A. Data redundancy

B. Data inconsistency

C. Data isolation

D. Data security

E. Data dependence

 

17. The data in a data warehouse have which of the following characteristics?

A. are organized by subject

B. are coded in different formats

C. are updated in real time

D. are typically retained for a defined, but limited, period of time

E. are organized in a hierarchical structure

 

18. Electronic commerce provides opportunities to do all of the following except:

A. For companies to expand their reach

B. For companies to expand at relatively high cost

C. For companies to put rich information on their Web sites

D. For companies to increase market share

E. For companies to adopt new business models

 

19. The advantages of B2C for consumers include all of the following except:

A. You can buy from home 24 hours per day, 7 days per week.

B. You have a wider variety of products to choose from.

C. You typically cannot access additional information, so you do not have information overload.

D. You can easily compare prices and features.

E. You can find unique items.

 

20. In the _____ B2B application, the orders of many buyers are aggregated so that they total to a large volume, in order to merit more seller attention.

A. buy-side

B. sell-side

C. auctions

D. group purchasing

E. electronic exchange

 

21. This asks the questions, “What tasks will be performed? How will the work be performed?, Who will do the work?, and Where will the work be performed”?

A. Job design framework

B. Job description analysis

C. Custom system framework

D. Work entry point

E. Job analysis system

 

22. This technology has enabled changes in many jobs. For example financial analysts can download reports from a corporate web site in minutes.

A. email system

B. groupware

C. Internet

D. laptops

E. collaboration

 

23. Technology has significantly changed the way work is done and how managers interact with employees. One technological solution helps to solve the problem of lack of direct supervision by permitting managers to monitor employees based on ________________________ compensation strategies.

A. valued added work

B. pay for performance

C. team work

D. work performance

E. piece work performance

 

24. Enterprise resource planning systems are very _____ software products, meaning that companies typically have to change their _____ to accommodate how the software functions.

A. unstructured, business processes

B. structured, reporting relationships

C. structured, accounting processes

D. unstructured, inventory control

E. structured, processes` business

 

25. If you buy a science fiction book from Amazon.com, the company s software will automatically recommend similar books bought by other readers. This is an example of:

A. cross-selling

B. up-selling

C. one-to-one marketing

D. viral marketing

E. permission marketing

 

26. Supply chain complexity and scale:

A. Affect both very small companies and large, global organizations

B. Were difficult to address before the Internet

C. Result when firms product complex products and services

D. Result when firms implement full-scale, supply chain management systems

E. Result when companies implement extranets and EDI

 

27. Which era of information resources focused primarily on effectiveness such solving problems and creating opportunities?

A. 1960s

B. 1970s

C. 1980s

D. 1990s

E. 2000+

 

28.This is defined as the available data, technology, people, and processes within an organization?

A. Information Management

B. Information Technology

C. Information Systems

D. Information Resources

E. Information Networks

 

29. Which one of the following would NOT be considered an information resource that is available to a firm?

A. Information and knowledge

B. Proprietary technology

C. End users of IS

D. Business processes

E. Customer interaction

 

30. In this business structure a common view of a firm is as a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon.

A. Technology

B. Business reengineering approach

C. Silo

D. Process Control

E. Business process

 

31. These are comprehensive software packages that incorporate all modules needed to run the operations of a business. They should include the following modules: Manufacturing, Accounting, Human resources and Sales.

A. BRP systems

B. Groupware system

C. ERP systems

D. TQM systems

E. BBB systems

 

32. By 1998, approximately _____% of companies with annual revenues greater than $1 billion has installed ERP systems.

A. 20

B. 25

C. 30

D. 35

E. 40

 

33. Decisions today are becoming _____ complex, due to _____ uncertainty in the decision environment.

A. less, decreased

B. more, decreased

C. less, increased

D. more, increased

E. about the same, decreased

 

34. _____ provides users with a view of what is happening, where _____ addresses why it is happening. A. Multidimensional data analysis, structured query language

B. Data mining, multidimensional data analysis

C. Data mining, expert system

D. Multidimensional data analysis, neural networks

E. Multidimensional data analysis, data mining

 

35. Which of the following are not provided by digital dashboards?

A. Drill down

B. Transaction processing

C. Status access

D. Key performance indicators

E. Exception reporting

 

36. The information systems planning process proceeds in which order?

A. Organization mission organization strategic plan IS strategic plan new IT architecture

B. Organization mission IS strategic plan organization strategic plan IS operational plan

C. Organization strategic plan organization mission IS strategic plan new IT architecture

D. IT architecture IS strategic plan organization strategic plan organization mission

E. IS development projects IS operational plan new IT architecture organization mission

 

37. The _____ that changes are made in the systems development life cycle, the _____ expensive these changes become.

A. sooner, less

B. later, less

C. more frequently, more

D. more extensively, more

E. sooner, more

 

38. Any systems acquisition effort is mainly driven by

A. organizational change

B. feasibility studies

C. data needs

D. user information requirements

E. corporate strategy

 

39. This counts the actual activities that go into making a specific product or delivering a specific service. A. Total Activity Costing

B. Focused Based Costing

C. Activity Based Costing

D. Unit Based Costing

E. Activity Induced Costing

 

40. This financial calculation provides a percentage rate that measures the relationship between the amount the business gets back from an investment and the amount invested.

A. IRR

B. ROI

C. Payback

D. NPV

E. EVA

 

41. Managers want to analyze the costs of informal support of their IT infrastructure for two reasons: the costs and the ____________________________.

A. time to fix a problem

B. effect the support activity has on morale

C. quantity of informal support activity

D. the quality of the informal support activity

E. relative need across the company

 

42. What is _____ is not necessarily _____.

A. Illegal, unethical

B. Ethical, illegal

C. Unethical, illegal

D. Unethical, legal

E. Ethical, legal

 

43. Which of the following statements is correct?

A. An individual s right to privacy is absolute.

B. It is difficult to determine and enforce privacy regulations.

C. An individual s right to privacy supersedes the needs of society.

D. Advances in information technologies have not affected individual privacy.

E. The Internet has increased individuals privacy.

 

44. Your company s computers have been taken over by an attacker and used to attack other organization s information systems. Your problem is which of the following?

A. poor security policies and procedures

B. lack of due diligence

C. downstream liability

D. poor service-level agreements

E. users have a lack of information security awareness

 

45. Individuals are finding it convenient and productive to use wireless devices for which of the following reasons?

A. To make use of time that was formerly wasted

B. To become more efficient

C. Work locations are more flexible

D. To be able to allocate working time around personal and professional obligations

E. All of the above

 

46. Of the following, which is the major problem with smart phones?

A. They are too slow.

B. They are too expensive.

C. They can be used to compromise security.

D. Their screens are too small.

E. Their browsers are not fully functional.

 

47. Which of the following statements about Wi-Fi is not correct?

A. Wi-Fi provides simple Internet access.

B. Laptop PC scan contain chips that can send and receive Wi-Fi signals.

C. Many companies offer free Wi-Fi access in their stores.

D. Wi-Fi requires encryption for secure transmissions.

E. Wi-Fi is expensive to set up.

 

48. This is a piece of data that is stored on the users computer by a company that the user accesses using a web browser?

A. Script

B. Cookie

C. Data-Link File

D. DLL File

E. Data file

 

49. This ethical theory states that managers are entrusted with a fiduciary responsibility to all those who hold a stake in or a claim on the firm .

A. Stockholder theory

B. Stakeholder theory

C. Property theory

D. Fiduciary theory

E. Normative theory

 

50. What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards is part of this ethical issue?

A. Privacy

B. Accuracy

C. Accessibility

D. Perfection

 

E. Property

 

1. _______________ are self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device, ranging from personal computers to mobile phones.

a) XML 

b) Web Services

c) Object Services

d) Information Services

e) HTML

 

 

2. The most traditional model of client server computing uses the _______________ to act as a database server providing data for analysis done by the PC clients using spreadsheets, database management systems, and application software.

a) personal computer

b) mainframe

c) mini computer

d) super computer

e) micro computer

 

 

3. The _______________ part of the supply chain includes the activities of a manufacturing company with its first-tier suppliers (which can be manufacturers and/or assemblers) and their connection to their second-tier suppliers.

a) downstream

b) midstream

c) upstream

d) internal

e) none of the above

 

 

4. The part of the supply chain which is mainly concerned with production management, manufacturing, and inventory control is:

a) downstream.

b) midstream.

c) upstream.

d) internal.

e) cross stream.

 

 

5. _______________ is the high-level map or plan of the information requirements of an organization, which is used to guide current operations and          plan future ones. 

a) Information infrastructure

b) Conceptual data model

c) Logical data model

d) Information technology architecture

e) Tele-Info architecture

 

 

6. _______________ includes the system hardware, development software, networks and communications facilities, databases, and information systems personnel.

a) Physical data model

b) Information infrastructure

c) Systems architecture

d) Information architecture

e) Logical data model

 

 

7. A _______________ handles the day-to-day, routine, repetitive tasks that are essential to the operation of the organization.  Activities supported include the monitoring, collection, storage, processing and dissemination of the organization’s basic business transactions.

a. transaction processing system

b. management information system

c. knowledge management system

d. office automation system

 

 

8. _______________ was the dominant computing architecture until the mid-1980s. Very few organizations use this type of architecture exclusively today due to its inflexibility and poor price-to-performance ratio.

a) Mainframe computing environment

b) PC computing environment

c) Client/Server computing environment

d) Distributed computing environment

e) Network

 

 

9. In a ____________computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) Mainframe

b) PC

c) Hybrid

D) Distributed

e) Network

 

 

10. Technically, what distinguishes the Internet is its use of a set of protocols called:

a) TCP/IP.

b) MCP/IR.

c) PCP/IP.

d) TKP/IR.

e) TCP/ITP.

 

 

11. The purpose of the _______________ architecture is to maximize the use of computer resources. It provides a way for different computing devices to work together, each doing the job for which it is best suited.

a) mainframe computing

b) client/server computing

c) PC computing

d) centralized computing

e) network computing

 

 

 

12. A well-known grid-computing project is the _______________ project. In this project, PC users worldwide donate unused processor cycles to help the search for signs of extraterrestrial life by analyzing signals coming from outer space.

a) BETI project

b) RETI project

c) SETI @ Home project

d) CETI @ Home project

e) JETI project

 

 

13. _______________ architecture is the basis of file sharing over the Web and the basis on which companies such as Napster, Kazaa, and Gnutella operate.

a) Mainframe computing

b) P2P

c) B2B

d) P2C

e) G2G

 

 

14. A _______________ provides periodic information about such topics as operational efficiency, effectiveness and productivity by extracting information from databases and processing it according to the needs of the user.

a. transaction processing system

b. management information system

c. executive information system

d. office automation system

e. management system

 

 

15. Which of the following is the most accurate definition of an extranet?

a. It allows remote users to securely connect over the Internet or via private networks to the enterprise’s main intranet.

b. It allows remote users to securely connect over the Internet to the enterprise’s main intranet.

c. It allows remote users to securely connect via private networks to the enterprise’s main intranet.

d. It allows remote users to connect via private networks to the enterprise’s main intranet.

e) It allows remote users to securely connect via private networks to the Internet.

 

 

16. Which of the following statements about Legacy systems is NOT true?

a. Legacy systems are usually transaction processing systems.

b. Legacy systems are usually housed in a secure location.

c. Legacy systems are usually pure mainframe systems or distributed systems in which the mainframe plays the major role.

d. Interfacing newer systems with legacy systems is so complicated that it is entirely avoided during systems integration efforts.

e) Legacy Systems are those with which a company has great affinity.

 

 

17. The function of corporate portals is often described as “_______________,” since they support decisions central to particular goals of the enterprise.

a) casting

b) broadcasting

c) corecasting

d) webcasting

e) webtransmit

 

 

18. Which of the following statements is NOT true about the changing role and structure of the IS department (ISD)?

a) The role of ISD is changing from purely technical to more managerial and strategic.

b) The ISD is creating business alliances with vendors and IS departments in other organizations. 

c) The ISD is educating the IS staff about business and educating non-IS managers about information technology (IT).

d) The ISD is becoming more centralized for better coordination and control.

e) The ISD is in control.

 

 

19. Which of the following statements is NOT true about the utility computing concept?

a) The vision behind utility computing is to have computing resources flow like electricity from virtual utilities around the globe.

b) Preparing for this era of utility computing, IBM is moving aggressively into the application services provider area.

c) Some experts believe that all software will become a service and be sold as a utility one day.

d) The utility computing concept works equally well for all types of applications.

e) Distributed computing concept is best.

 

 

20. Which of the following statements is MOST true about the utility computing concept?

a) A major commercial application of grid computing is Sony’s attempt to link online thousands of Sony video-game consoles.

b) A well-known grid computing project is the SETI @ Home project.

c) The grid does the computing very efficiently but at a higher cost.

d) According to this concept, unused processing cycles of all computers in a given network can be harnessed to create powerful computing capabilities.

e) The grid does the computing less efficiently but at a lower cost.

 

 

21. The _______________ describes organizational plans, visions, objectives and problems, and the information required to support them.

a) business architecture

b) client/server architecture

c) information infrastructure

d) service-oriented architecture

e) none of the above

 

 

22. A _______________ supports the monitoring, collection, storage, processing, and dissemination of the organization’s basic business transactions.

a) transaction processing system (TPS)

b) web based system (WBS)

c) enterprisewide information system (EIS)

d) decision support system

e) none of the above

 

23. _______________ architecture is a special client/server architecture that provides some additional new and useful functionalities.

a) Mainframe

b) Legacy

c) Distributed

d) Peer-to-peer

e) Client/server

 

 

24. A _______________ is a computer such as a PC attached to a network, which is used to access shared network resources. A _______________ is a machine that is attached to this same network and provides services.

a) client, client

b) client, server

c) server, client

d) server, server

e) all of the above

 

25. _______________ connect several intranets via the Internet, by adding to the Internet a security mechanism and possibly some functionalities.

a) Extranets

b) Intranets

c) Internets

d) ISP

e) ASP

 

 

26. FedEx’s business model supports _______________ hour delivery to anywhere in the world.

a) 9 – 18

b) 12 – 24

c) 24 – 48

d) 48 – 96

e) 97-110

 

 

27. _____________ is a computer program designed to support a specific task or business process (such as execute the payroll).

a) Application Program

b) Data Items

c) Information

d) Database

e) Data warehouse

 

 

28. ________________ consists of stored data items organized for retrieval.

a) Data Base

b) Information

c) Data Item

d) Knowledge

e) Software

 

29. __________________ are data that have been organized so that they have meaning and value to the recipient.

a) Data items

b) Information

c) Knowledge

d) Network

e) Internet

 

 

30. _________________ consists of data and/or information that have been organized and processed to convey understanding.

a) Knowledge

b) Data Items

c) Network

d) Internet

e) Binary

 

 

31. Information systems that connect two or more organizations are called:

a) IOSs.

b) EIS .

c) TPS.

d) DDS.

e) ICP.

 

 

32. Information systems that serve several departments or the entire enterprise are called:

a) IOSs.

b) TPS.

c) DDS.

d) EIS.

e) ESS.

 

 

33. The first type of IT system that was developed in the 1980’s to improve communications with business partners was:

a) IOS’s.

b) EIS.

c) TPS.

d) EDI.

e) ESS.

 

 

34. _____________ supports the monitoring, collection, storage, processing, and dissemination of the organizations basic business transactions.

a) TPS

b) EIS

c) EDI

d) DDS

e) ESS

 

 

35. _____________ deal with day-to-day operations of an organization.

a) Operational activities

b) Managerial activities

c) Decisional Activities

d) Organizational Activities

e) Decision Systems

 

 

36. _____________ also called tactical activities or decisions, deal in general with middle-management activities.

a) Organizational Activities

b) Managerial Activities

c) Operational Activities

d) Employee Activities

e) Director Activities

 

 

37. Which of these is not one of the 5 major components of the information infrastructure?

a) networks and communication facilities

b) databases

c) mainframe computing

d) computer hardware

e) software

 

 

38. In ___________ computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) mainframe

b) PC

c) hybrid

d) distributed

e) Networks

 

 

39. Typical Information Systems the follow the Organizational Structure is NOT right?  “Organizational Structures are _______________.”

a) functional

b) enterprisewide

c) restructional

d) interorganizational

e) intraorganizational

 

 

40. Which one of these is a worldwide system of computer networks that are accessible to hundreds of millions of people?

a) Internet

b) intranet

c) extranet

d) corporate portal

e) public portal

 

 

41. According to Bill Gates, _______________ computing is computing that is available, reliable, and secure as electricity, water services and telephony.

a) wireless

b) utility

c) grid

d) pervasive

e) mobile

 

 

42. The major function of information systems in an organization in order of importance are:

a) human resources, manufacturing (operations), marketing, finance, and accounting.

b) finance, manufacturing (operations), accounting, marketing, and human resources.

c) manufacturing (operations), accounting, finance, marketing, and human resources.

d) accounting, finance, manufacturing (operations), human resources, and marketing.

e) none of the above

 

43. Which of the following would NOT be considered data?

a) grade point average   

b) letter   

c) word

d) number

e) ordinal

 

 

44. A(n) _______________ is a network of interactions and relationships over which information, service, and payment are exchanged.

a) electronic exchange

b) the enterprise web

c) electronic market

d) wireless computing

e) mobile computing

 

 

45. The type of IT system that was developed in the 1980’s to improve communications with business partners was:

a) knowledge work system.

b) executive support system.

c) electronic data interchange.

d) group support system.

e) TPS.

 

 

�::d-p�Xd�ht:normal’>

 

E. Their browsers are not fully functional.

 

47. Which of the following statements about Wi-Fi is not correct?

A. Wi-Fi provides simple Internet access.

B. Laptop PC scan contain chips that can send and receive Wi-Fi signals.

C. Many companies offer free Wi-Fi access in their stores.

D. Wi-Fi requires encryption for secure transmissions.

E. Wi-Fi is expensive to set up.

 

48. This is a piece of data that is stored on the users computer by a company that the user accesses using a web browser?

A. Script

B. Cookie

C. Data-Link File

D. DLL File

E. Data file

 

49. This ethical theory states that managers are entrusted with a fiduciary responsibility to all those who hold a stake in or a claim on the firm .

A. Stockholder theory

B. Stakeholder theory

C. Property theory

D. Fiduciary theory

E. Normative theory

 

50. What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards is part of this ethical issue?

A. Privacy

B. Accuracy

C. Accessibility

D. Perfection

 

E. Property

 

1. _______________ are self-contained, self-describing business and consumer modular applications, delivered over the Internet, that users can select and combine through almost any device, ranging from personal computers to mobile phones.

a) XML 

b) Web Services

c) Object Services

d) Information Services

e) HTML

 

 

2. The most traditional model of client server computing uses the _______________ to act as a database server providing data for analysis done by the PC clients using spreadsheets, database management systems, and application software.

a) personal computer

b) mainframe

c) mini computer

d) super computer

e) micro computer

 

 

3. The _______________ part of the supply chain includes the activities of a manufacturing company with its first-tier suppliers (which can be manufacturers and/or assemblers) and their connection to their second-tier suppliers.

a) downstream

b) midstream

c) upstream

d) internal

e) none of the above

 

 

4. The part of the supply chain which is mainly concerned with production management, manufacturing, and inventory control is:

a) downstream.

b) midstream.

c) upstream.

d) internal.

e) cross stream.

 

 

5. _______________ is the high-level map or plan of the information requirements of an organization, which is used to guide current operations and          plan future ones. 

a) Information infrastructure

b) Conceptual data model

c) Logical data model

d) Information technology architecture

e) Tele-Info architecture

 

 

6. _______________ includes the system hardware, development software, networks and communications facilities, databases, and information systems personnel.

a) Physical data model

b) Information infrastructure

c) Systems architecture

d) Information architecture

e) Logical data model

 

 

7. A _______________ handles the day-to-day, routine, repetitive tasks that are essential to the operation of the organization.  Activities supported include the monitoring, collection, storage, processing and dissemination of the organization’s basic business transactions.

a. transaction processing system

b. management information system

c. knowledge management system

d. office automation system

 

 

8. _______________ was the dominant computing architecture until the mid-1980s. Very few organizations use this type of architecture exclusively today due to its inflexibility and poor price-to-performance ratio.

a) Mainframe computing environment

b) PC computing environment

c) Client/Server computing environment

d) Distributed computing environment

e) Network

 

 

9. In a ____________computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) Mainframe

b) PC

c) Hybrid

D) Distributed

e) Network

 

 

10. Technically, what distinguishes the Internet is its use of a set of protocols called:

a) TCP/IP.

b) MCP/IR.

c) PCP/IP.

d) TKP/IR.

e) TCP/ITP.

 

 

11. The purpose of the _______________ architecture is to maximize the use of computer resources. It provides a way for different computing devices to work together, each doing the job for which it is best suited.

a) mainframe computing

b) client/server computing

c) PC computing

d) centralized computing

e) network computing

 

 

 

12. A well-known grid-computing project is the _______________ project. In this project, PC users worldwide donate unused processor cycles to help the search for signs of extraterrestrial life by analyzing signals coming from outer space.

a) BETI project

b) RETI project

c) SETI @ Home project

d) CETI @ Home project

e) JETI project

 

 

13. _______________ architecture is the basis of file sharing over the Web and the basis on which companies such as Napster, Kazaa, and Gnutella operate.

a) Mainframe computing

b) P2P

c) B2B

d) P2C

e) G2G

 

 

14. A _______________ provides periodic information about such topics as operational efficiency, effectiveness and productivity by extracting information from databases and processing it according to the needs of the user.

a. transaction processing system

b. management information system

c. executive information system

d. office automation system

e. management system

 

 

15. Which of the following is the most accurate definition of an extranet?

a. It allows remote users to securely connect over the Internet or via private networks to the enterprise’s main intranet.

b. It allows remote users to securely connect over the Internet to the enterprise’s main intranet.

c. It allows remote users to securely connect via private networks to the enterprise’s main intranet.

d. It allows remote users to connect via private networks to the enterprise’s main intranet.

e) It allows remote users to securely connect via private networks to the Internet.

 

 

16. Which of the following statements about Legacy systems is NOT true?

a. Legacy systems are usually transaction processing systems.

b. Legacy systems are usually housed in a secure location.

c. Legacy systems are usually pure mainframe systems or distributed systems in which the mainframe plays the major role.

d. Interfacing newer systems with legacy systems is so complicated that it is entirely avoided during systems integration efforts.

e) Legacy Systems are those with which a company has great affinity.

 

 

17. The function of corporate portals is often described as “_______________,” since they support decisions central to particular goals of the enterprise.

a) casting

b) broadcasting

c) corecasting

d) webcasting

e) webtransmit

 

 

18. Which of the following statements is NOT true about the changing role and structure of the IS department (ISD)?

a) The role of ISD is changing from purely technical to more managerial and strategic.

b) The ISD is creating business alliances with vendors and IS departments in other organizations. 

c) The ISD is educating the IS staff about business and educating non-IS managers about information technology (IT).

d) The ISD is becoming more centralized for better coordination and control.

e) The ISD is in control.

 

 

19. Which of the following statements is NOT true about the utility computing concept?

a) The vision behind utility computing is to have computing resources flow like electricity from virtual utilities around the globe.

b) Preparing for this era of utility computing, IBM is moving aggressively into the application services provider area.

c) Some experts believe that all software will become a service and be sold as a utility one day.

d) The utility computing concept works equally well for all types of applications.

e) Distributed computing concept is best.

 

 

20. Which of the following statements is MOST true about the utility computing concept?

a) A major commercial application of grid computing is Sony’s attempt to link online thousands of Sony video-game consoles.

b) A well-known grid computing project is the SETI @ Home project.

c) The grid does the computing very efficiently but at a higher cost.

d) According to this concept, unused processing cycles of all computers in a given network can be harnessed to create powerful computing capabilities.

e) The grid does the computing less efficiently but at a lower cost.

 

 

21. The _______________ describes organizational plans, visions, objectives and problems, and the information required to support them.

a) business architecture

b) client/server architecture

c) information infrastructure

d) service-oriented architecture

e) none of the above

 

 

22. A _______________ supports the monitoring, collection, storage, processing, and dissemination of the organization’s basic business transactions.

a) transaction processing system (TPS)

b) web based system (WBS)

c) enterprisewide information system (EIS)

d) decision support system

e) none of the above

 

23. _______________ architecture is a special client/server architecture that provides some additional new and useful functionalities.

a) Mainframe

b) Legacy

c) Distributed

d) Peer-to-peer

e) Client/server

 

 

24. A _______________ is a computer such as a PC attached to a network, which is used to access shared network resources. A _______________ is a machine that is attached to this same network and provides services.

a) client, client

b) client, server

c) server, client

d) server, server

e) all of the above

 

25. _______________ connect several intranets via the Internet, by adding to the Internet a security mechanism and possibly some functionalities.

a) Extranets

b) Intranets

c) Internets

d) ISP

e) ASP

 

 

26. FedEx’s business model supports _______________ hour delivery to anywhere in the world.

a) 9 – 18

b) 12 – 24

c) 24 – 48

d) 48 – 96

e) 97-110

 

 

27. _____________ is a computer program designed to support a specific task or business process (such as execute the payroll).

a) Application Program

b) Data Items

c) Information

d) Database

e) Data warehouse

 

 

28. ________________ consists of stored data items organized for retrieval.

a) Data Base

b) Information

c) Data Item

d) Knowledge

e) Software

 

29. __________________ are data that have been organized so that they have meaning and value to the recipient.

a) Data items

b) Information

c) Knowledge

d) Network

e) Internet

 

 

30. _________________ consists of data and/or information that have been organized and processed to convey understanding.

a) Knowledge

b) Data Items

c) Network

d) Internet

e) Binary

 

 

31. Information systems that connect two or more organizations are called:

a) IOSs.

b) EIS .

c) TPS.

d) DDS.

e) ICP.

 

 

32. Information systems that serve several departments or the entire enterprise are called:

a) IOSs.

b) TPS.

c) DDS.

d) EIS.

e) ESS.

 

 

33. The first type of IT system that was developed in the 1980’s to improve communications with business partners was:

a) IOS’s.

b) EIS.

c) TPS.

d) EDI.

e) ESS.

 

 

34. _____________ supports the monitoring, collection, storage, processing, and dissemination of the organizations basic business transactions.

a) TPS

b) EIS

c) EDI

d) DDS

e) ESS

 

 

35. _____________ deal with day-to-day operations of an organization.

a) Operational activities

b) Managerial activities

c) Decisional Activities

d) Organizational Activities

e) Decision Systems

 

 

36. _____________ also called tactical activities or decisions, deal in general with middle-management activities.

a) Organizational Activities

b) Managerial Activities

c) Operational Activities

d) Employee Activities

e) Director Activities

 

 

37. Which of these is not one of the 5 major components of the information infrastructure?

a) networks and communication facilities

b) databases

c) mainframe computing

d) computer hardware

e) software

 

 

38. In ___________ computing environment, processing work is divided between two or more computers. The participating computers can be all mainframes, all PCs, or as in most cases, a combination of the two types. They can be in one location or in several.

a) mainframe

b) PC

c) hybrid

d) distributed

e) Networks

 

 

39. Typical Information Systems the follow the Organizational Structure is NOT right?  “Organizational Structures are _______________.”

a) functional

b) enterprisewide

c) restructional

d) interorganizational

e) intraorganizational

 

 

40. Which one of these is a worldwide system of computer networks that are accessible to hundreds of millions of people?

a) Internet

b) intranet

c) extranet

d) corporate portal

e) public portal

 

 

41. According to Bill Gates, _______________ computing is computing that is available, reliable, and secure as electricity, water services and telephony.

a) wireless

b) utility

c) grid

d) pervasive

e) mobile

 

 

42. The major function of information systems in an organization in order of importance are:

a) human resources, manufacturing (operations), marketing, finance, and accounting.

b) finance, manufacturing (operations), accounting, marketing, and human resources.

c) manufacturing (operations), accounting, finance, marketing, and human resources.

d) accounting, finance, manufacturing (operations), human resources, and marketing.

e) none of the above

 

43. Which of the following would NOT be considered data?

a) grade point average   

b) letter   

c) word

d) number

e) ordinal

 

 

44. A(n) _______________ is a network of interactions and relationships over which information, service, and payment are exchanged.

a) electronic exchange

b) the enterprise web

c) electronic market

d) wireless computing

e) mobile computing

 

 

45. The type of IT system that was developed in the 1980’s to improve communications with business partners was:

a) knowledge work system.

b) executive support system.

c) electronic data interchange.

d) group support system.

e) TPS.

 

 

�::d-p�Xd�ht:normal’>

 

E. Their browsers are not fully functional.

 

47. Which of the following statements about Wi-Fi is not correct?

A. Wi-Fi provides simple Internet access.

B. Laptop PC scan contain chips that can send and receive Wi-Fi signals.

C. Many companies offer free Wi-Fi access in their stores.

D. Wi-Fi requires encryption for secure transmissions.

E. Wi-Fi is expensive to set up.

 

48. This is a piece of data that is stored on the users computer by a company that the user accesses using a web browser?

A. Script

B. Cookie

C. Data-Link File

D. DLL File

E. Data file

 

49. This ethical theory states that managers are entrusted with a fiduciary responsibility to all those who hold a stake in or a claim on the firm .

A. Stockholder theory

B. Stakeholder theory

C. Property theory

D. Fiduciary theory

E. Normative theory

 

50. What information does a person or an organization have a right or a privilege to obtain, under what conditions and with what safeguards is part of this ethical issue?

A. Privacy

B. Accuracy

C. Accessibility

D. Perfection

 

E. Property

 

 

 

 

Calculator

Calculate the price of your paper

Total price:$26
Our features

We've got everything to become your favourite writing service

Need a better grade?
We've got you covered.

Order your paper