MIS CH 1-5 TEST

An example of an organizational complementary asset is
using the appropriate business model.
A managerial element in the UPS tracking system described in the chapter is
the decision to use automation.
The temp agency that you own is having serious difficulties placing temps because few of them are familiar with Internet research. Investing in training software to enhance your workers’ skills is an example of using technology to achieve which business objective?
survival
The term “management information systems” designates a specific category of information systems serving
middle management functions.
Operational managers use ESS primarily to solve specific problems.
false
Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers?
extranet
A key word in social business is “conversations.”
true
An example of a cross-functional business process is
creating a new product
A ________ is a senior manager who oversees the use of IT in the firm.
CIO
To monitor the status of internal operations and the firm’s relations with the external environment, managers need ________ systems.
transaction processing
An organization’s MIS and DSS supply an ESS with summarized information.
true
One example of a business process is shipping a product to a customer.
true
The four major enterprise applications are
enterprise systems, SCMs, CRMs, and KMSs.
A business process in the ________ function is producing bills of material.
manufacturing and production
Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business.
true
Which level of the organization are ESS specifically designed to serve?
senior management
Which of the following systems would you expect to deliver integrated, personalized business content through a Web portal interface?
executive support systems
The ________ helps design programs and systems to find new sources of knowledge or to make better use of existing knowledge in organizational and management processes.
CKO
For nonroutine decision making, senior managers rely on management information systems.
false
Which of the following tools would you use to evaluate and choose a collaboration tool for your organization?
the time/space collaboration and social tool matrix
An inventory control system is an example of an MIS.
false
Most TPSs use sophisticated mathematical models or statistical techniques.
false
Which of the following is not a business benefit of collaboration?
improved compliance with government regulations
DSS use internal information as well as information from external sources.
true
If your main supplier was late in delivering goods, which type of system would you use to update your production schedule?
TPS
________ enable management to make better decisions regarding organizing and scheduling sourcing, production, and distribution.
SCMs
Which type of system integrates supplier, manufacturer, distributor, and customer logistics processes?
supply-chain management system
Which of the following is not one of the four main classifications for collaboration tools identified by the space/time matrix?
remote/colocated
Which type of system would you use to forecast the return on investment if you used new suppliers with better delivery track records?
DSS
Global firms can collaborate from different locations at the same time using synchronous collaboration tools.
true
You would use an MIS to help determine if your business should introduce a new product line.
false
In ________, digital technology and the Internet are used to execute the major business processes in the enterprise.
e-business
What is the most important function of an enterprise application?
enabling business functions and departments to share information
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.
decision-support
The principal liaison between the information systems groups and the rest of the organization is a(n)
system-analyst
DSS are used by managers to make decisions about problems that are unusual and not easily specified in advance.
true
Transaction-level information is essential for operational management to be able to direct the day-to-day operations of the business.
true
Which of the following is a highly structured decision?
granting credit to a customer
You have been hired by Inspiration Inc., to help improve their profit margin. Inspiration Inc. is a business communications consultancy that services many clients in different industries throughout the United States. The end products of the company are customized recommendations for the best use of a client’s existing resources for improving internal communications, typically delivered via documentation in different media. The company has approximately 100 consultants, all of whom are located in their central headquarters in Chicago. What system do you recommend to improve the company’s business processes and increase their profit margin?
Correct extranet, to enable quick collaboration over the Internet, minimize the time spent communicating with the client, and minimize the amount of paperwork needed
Which of the following is a firm’s CPO responsible for?
ensuring that the company complies with existing data privacy laws
You manage the IT department at a small startup Internet advertiser. You need to set up an inexpensive system that allows customers to see real-time statistics such as views and click-throughs about their current banner ads. Which type of system will most efficiently provide a solution?
extranet
Executive support systems are information systems that support the
long-range planning activities of senior management.
Non-typical business problems with causes and effects that are rapidly changing are typically handled by which type of information system?
DSS
A relocation control system that reports summaries on the total moving, house hunting, and home financing costs for employees in all company divisions would fall into the category of
Management information systems
Cross-functional systems are being phased out in favor of systems that support business processes within a single functional group, such as human resources.
false
An information systems manager
manages data entry stuff
an inventory control system is an example of an MIS
false
________ allows you to communicate with avatars using text messaging.
A virtual world
A(n) ________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business.
enterprise
Supply chain management systems are more externally oriented than enterprise systems.
true
FWO’s use of SharePoint for project management is an example of using information systems to achieve which business objective?
improved decision making
________ systems are also known as enterprise systems.
enterprise resource planning
Which of the following decisions requires knowledge based on collaboration and interaction?
Should we work with outside vendors on new products and services?
Operational managers use ESS primarily to solve specific problems.
false
Which of the following statements about collaboration is not true?
Successful collaboration can be achieved through technology regardless of the organization’s culture or structure.
Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers?
extranet
To consolidate the relevant knowledge and experience in the firm and make it available to improve business processes and management decision making, you would use a(n)
KMS
MIS job growth is projected to be 50% greater than other jobs in the next five years.
true
Using the Internet to buy or sell goods is called
e-commerce
Using ________ to enable government relationships with citizens, businesses, and other arms of government is called e-government.
the internet and networking technologies
DSS use internal information as well as information from external sources.
true
________ is a collaboration tool that supports remote (different place), synchronous (same time) collaboration.
video conferencing
Which of the following systems is designed to support organization-wide process coordination and integration?
enterprise applications
Some organizations lack bedrock, unassailable assumptions that define their goals and products.
false
A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
value web
Which of the following is not a major feature of organizations that impacts the use of information systems?
agency costs
Why does Amazon.com need to worry about competitors in online shopping?
internet technologies are universal, and therefore usable by all companies
Research has shown that a majority of firms are able to align their information technology with their business goals.
true
Customers are one of the competitive forces that affect an organization’s ability to compete.
true
The effect of the Internet has been to decrease the bargaining power of customers.
false
The ability to offer individually tailored products or services using the same production resources as bulk production is known as
mass customization
Switching costs increase when customers are strongly linked to products and platforms.
true
Walmart’s continuous replenishment system allows it to
achieve low-cost leadership
All of the following industries have been disrupted by the Internet except
clothing
How do information systems enhance core competencies?
by encouraging the sharing of knowledge across business units
High product differentiation is a sign of a transparent marketplace.
false
You are consulting for a cosmetics distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step?
perform a strategic systems analysis
Business processes are collections of
routines
In a demonstration of network economics, the more people that use eBay’s site, the greater the value of the site.
true
All of the following are IT-enabled products and services providing competitive advantage except
walmart’s retailing system
The Internet raises the bargaining power of customers by
making information available to everyone
How does the technical view of organizations fall short of understanding the full impacts of information systems in a firm?
it sees the inputs and outputs, labor and capital, as being infinitely malleable
The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as
the law of diminishing returns
network economics
sees the cost of adding new members as inconsequential
the value chain model
highlight specific activities in the business where competitive strategies can best be applies
a substitute product of most concern for a cable tv distributor is
satellite tv
an example of synergy in business is
bank of america
walmarts attempts to increase its online presence is an example of a firm using information systems to
achieve low-cost leadership
in he value chain model, support activities are most directly related to the production and distribution of the firm’s products and services, which create value
false
An efficient customer response system directly links consumer behavior to distribution and production and supply chains.
true
How are information systems used at the industry level to achieve strategic advantage?
by building industry-wide, IT-supported consortia and symposia
Amazon’s use of the Internet as a platform to sell books more efficiently than traditional bookstores illustrates a use of information services for
low-cost leadership
All of the following are considered disruptive technologies except
instant messaging
Sociotechnical changes affecting a firm adopting new information systems requiring organizational change can be considered
strategic transitions
All of the following are competitive forces except
external environment
an organization is a
true
Which of the following industries has a low barrier to entry?
restaurant
The four major competitive strategies are
low-cost leadership, product differentiation, focus on market niche, and customer and supplier intimacy.
A(n) ________ is a collection of independent firms that use information technology to coordinate their value chains to collectively produce a product or service for a market.
value web
Nike’s forays into information technology represent an effort to
achieve product differentiation
A professional bureaucracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
true
A(n) ________ is an activity at which a firm excels as a world-class leader.
core competency
A competitive force challenging the publishing industry is
substitute products or services
A firm can exercise greater control over its suppliers by having
more suppliers
What are the most successful solutions or methods for achieving a business objective?
best practices
‘Synergies’ occur when the output of some units in a firm can be used as inputs to other units, lowering cost and generating profits.
true
Routines are also called standard operating procedures.
true
According to research on organizational resistance, the four components that must be changed in an organization in order to successfully implement a new information system are
tasks, technology, people, and structure
The interaction between information systems and organizations is influenced
by the development of new information technologies
When a firm buys on the marketplace what it cannot make itself, the costs incurred are referred to as
transaction costs
When two organizations pool markets and expertise that result in lower costs and generate profits, it is referred to as creating
synergies
In environmental scanning, a firm may use information systems to
identify external events that may affect it
a virtual company
uses networks to link people, assets, and ideas
The divergent viewpoints about how resources, rewards, and punishments should be distributed, and the struggles resulting from these differences are known as
politics
Which of the following represent the primary activities of a firm?
inbound logistics, operations, outbound logistics, sales and marketing, and service
A collection of independent firms that use information technology to coordinate their value chains to produce a product or service for a market collectively is called a(n)
value web
All of the following statements are true about information technology’s impact on business firms except
it helps firms expand in size
Mass customization offers individually tailored products or services using the same resources as mass production.
true
Network economics
yes the cost of adding new members as inconsequential
routines are also called standard operating procedures
true
According to agency theory, the firm is viewed as a(n)
“nexus of contracts” among self-interested individuals.
An example of a divisionalized bureaucracy is a
An example of a divisionalized bureaucracy is a
fortune 500 firm
Firms use a ________ strategy to provide a specialized product or service for a narrow target market better than competitors.
market niche
A company’s competitive advantages ultimately translate into higher stock market valuations than its competitors.
true
The use of Internet technologies allows companies to more easily sustain competitive advantage.
false
The term business ecosystem describes the loosely coupled but interdependent networks of suppliers, distributors, outsourcing firms, transportation service firms, and technology manufacturers.
true
An activity businesses perform to measure and compare business processes to similar processes of other companies within their industry is
benchmarking
Which of the following is one of the support activities in a firm’s value chain?
technology
the value chain model
Correct highlights specific activities in the business where competitive strategies can best be applied.
The parts of an organization’s infrastructure, human resources, technology, and procurement that make the delivery of the firm’s products or services possible are known as ________ activities.
support
The ________ function is responsible for identifying customers.
sales and marketing
All of the following are reasons for the increased business focus on collaboration and teamwork, except for
the need for more efficient work hierarchies
Decision-support systems are most commonly used by the operations management level of an organization.
false
To forecast trends in your supplier’s industry that could affect your firm over the next five years, you would use a(n)
ESS
You would use a(n) ________ in order to determine which of your suppliers has the best and worst records for keeping to your production schedule?
MIS
Production tasks are coordinated through the use of social networks in social business.
false
Identifying customers is a business process handled by the human resources function.
false
An example of a keystone firm within a business ecosystem is
apple and software application writers in the mobile platform ecosystem
A manufacturer of deep-sea oil rigs may be least concerned about this marketplace force.
new market entrants
Under Mintzberg’s classification of organizational structure, the knowledge-based organization where goods and services depend on the expertise and knowledge of professionals falls under the category of
professional bureaucracies
Mintzberg classifies a large bureaucracy existing in a slowly changing environment that produces standard products and is dominated by centralized management as a ________ bureaucracy.
machine
Which of the following best describes intellectual property?
intangible property created by individuals or corporations
Software programs were unprotected by copyright law until the early 1990s.
false
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
quality of life
Which of the following is a primary drawback to the “do anything anywhere” computing environment?
It blurs the traditional boundaries between work and family time.
Which of the following describes Immanuel Kant’s Categorical Imperative?
If an action is not right for everyone to take, it is not right for anyone to take.
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
true
When a software product is considered ________, it becomes difficult to hold software producers liable for flaws in their product.
similar to books
The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.
digital
Re-designing and automating business processes can be seen as a double-edged sword because
increases in efficiency may be accompanied by job losses.
CVS refers to
eyestrain related to computer display screen use.
Any intellectual work product that isn’t based on public knowledge can be classed as a trade secret.
true
The ethical “no free lunch” rule states that
everything is owned by someone else, and that the creator wants compensation for this work.
One of the drawbacks of patent protection is
the years of waiting to receive it.
The strength of patent protection is that it
Correct grants a monopoly on underlying concepts and ideas.
In recent years, the illegal sharing of music files has declined with the improvement of technological prevention.
true
Spam is legally defined as any e-mail that is unsolicited.
false
Which of the following best describes the basis for the FIP principles?
the mutuality of interest between the record holder and the individual
The rate of global piracy is approximately 42%.
true
The most common reason business systems fail is
data quality
________ restricts the information that the U.S. federal government can collect about an individual and regulates what it can do with the information.
the privacy act of 1974
In today’s legal environment, business managers who violate the law through the misuse of information systems are still unlikely to be fully prosecuted.
false
“Look and feel” copyright infringement lawsuits are concerned with
the distinction between idea and its expression
The limitation of trade secret protection for software is that it is difficult to prevent the ideas in the work from falling into the public domain when
the software is widely distributed
Which of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
HIPPA
The Federal Trade Commission FIP principle of Notice/Awareness states that
Web sites must disclose their information practices before collecting data.
Which legal mechanism grants the owner exclusive ownership of the ideas behind an invention for 20 years?
patent
Copyright is the legal protection afforded intellectual property, including drawings, movies, and maps.
true
________ prohibits an organization from collecting any personal information unless the individual specifically takes action to approve information collection and use.
The opt-in model
In 2010, the FTC added all of the following recommendations to its privacy guidelines except
firms should limit the length of time that any personal data is stored to six months or less.
Which of the following is the primary reason that the practice of spamming has grown exponentially?
it is very inexpensive and can reach so many people
According to several court findings, the general functional features of software are protected by copyright law.
false
COPPA is a set of five principles developed by the FTC that most American and European privacy law is based on.
false
Gaining unapproved access to a computer is not a federal crime.
false
Taking the action that produces the least harm best describes the
Risk Aversion Principle.
Which of the following best describes the effect that new information technology has on society?
Correct It has a ripple effect, raising new ethical, social, and political issues.
Although online tracking gathers an enormous amount of information on individual users, it is anonymous and can’t be tied to a specific person.
false
________ is a societal practice of having laws that are known and understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.
Due process
The routine violation of individual privacy is made more difficult by advances in data storage.
false
Key differences between software and books include all of the following except
Correct software products are more easily compared to each other than books.
One of the key concepts in patent law is novelty.
true
Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user’s online behavior.
true
Most Internet businesses do very little to protect the privacy of their customers.
true
Cookies created during Web site visits are stored
on the users computer
________ is a new data analysis technology that finds hidden connections between data in disparate sources.
NORA
________ enables advertisers to display more relevant ads based on user’s search and browsing history.
behavioral targeting
The European Parliament has yet to ban unsolicited commercial messaging.
false
Ethics describes the principles of right and wrong that can be used by individuals to make choices to guide their behavior.
true
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
true
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
RSI
The symptoms of technostress include aggravation and hostility toward humans.
true
A Facebook users’ visit to a Web site can be tracked even if they do not click a Like button.
true
________ are not held liable for the messages they transmit.
regulated common carriers
As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.
slippery-slope rule
The problem with Web browsers’ Do Not Track options is that Web sites aren’t obligated to honor these settings.
true
Which of the following is not one of the current key technology trends that raises ethical issues?
increase in multimedia quality
________ is a feature of social institutions that means mechanisms are in place to determine responsibility for an action.
accountability
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
trueSpam is legally defined as any e-mail that is unsolicited.
The central business activities of ChoicePoint raise which of the five moral dimensions?
information rights and obligations
Which of the following best describes how new information systems result in legal gray areas?
they result in new situations that are not covered by old laws
The U.S. CAN-SPAM Act of 2003
requires spammers to identify themselves
CVS refers to
eyestrain related to computer display screen use
The Online Privacy Alliance
encourages self regulation to develop a set of privacy guidelines for its members.
Because of their special claims to knowledge, wisdom, and respect, professionals take on special rights and obligations.
true
________ means that you accept the potential costs and obligations for the decisions you make.
responsibility
________ is the use of computers to assemble data from different sources to create electronic dossiers of detailed information about individuals.
profiling
________ protects the creators of intellectual property from having their work copied by others.
copyright law
The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.
false
A peer at work takes small amounts of office supplies for her own use at home, saying that this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
Kant’s Categorical Imperative
The ________ framework developed by the U.S. Department of Commerce allows U.S. businesses to legally use personal data from EU countries.
safe-harbor
Unlike regular browser cookies, Flash cookies
cannot be easily detected or deleted
Privacy protection in the United States is ________ in Europe.
much less stringent than
________ are not held liable for the messages they transmit.
regulated common carriers
Which of the following is not one of the current key technology trends that raises ethical issues?
increase in multimedia quality
Which of the following is not one of the types of information gathered by Web site tracking tools?
birthplace
Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages that are used to track and report a user’s online behavior.
true
U.S. businesses are allowed to use personal data from EU countries if they
develop equivalent privacy protection policies
The practice of contracting custom software development to an outside firm is commonly referred to as
outsourcing
Interpretations of Moore’s law assert that
computing power doubles every 18 months
Today’s nanotechnology-produced computer transistors are roughly equivalent in size to
a virus
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)
two-tiered client/server architecture
Which of the following is the most popular mobile operating system?
android
How would you determine the market demand for your firm’s IT services?
hold focus groups to assess your services
The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor.
wintel
The development of TCP/IP occurred during the ________ era.
enterprise computing
Which of the following is a leading networking hardware provider?
Cisco
Today, many business firms continue to operate their legacy systems that meet a business need and would be costly to replace.
true
Which of the following is not one of the current software platform trends?
multicore processors
Web services can exchange information between two different systems only if the operating systems and programming languages upon which the systems are based are identical.
false
Hardware and software acquisition costs account for about ________ percent of TCO.
20
The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
true
Application server software is responsible for locating and managing stored Web pages.
false
________ surfaces allow users to gesture on a screen with several fingers to execute commands.
multitouch
the introduction of the minicomputer
allowed computers to be customized to specific needs of departments or business units
The phenomenon of employees using their own devices in the workplace is known as
BYOD
Which of the following factors does not help explain why computing resources today are ever more available than in previous decades?
widespread rejection of technology standards
A primary example of centralized processing is client/server computing.
false
Running a Java program on a computer requires
a Java Virtual Machine to be installed on that computer.
TCO refers to the original cost of purchased technology: both hardware and software.
false
Software that manages the resources of the computer is called
operating system software
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
True
All of the following are cloud computing services except
virtualization as a service.
Which of the following is not one of the NIST defined characteristics of cloud computing?
reduced elasticity
________ states that the value or power of a network grows exponentially as a function of the number of network members.
Metcalfe’s law
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?
on-demand
Which of the following is not an IT infrastructure service component?
operating system software
The operating system is used to manage the computer’s activities.
true
Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.
true
In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.
true
Quantum computing is implemented primarily with enterprise or ISP servers.
false
Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.
true
Which type of infrastructure service provides voice and video connectivity to employees, customers, and suppliers?
telecommunications
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.
multicore processor
________ are created by combining and customizing components from different online software applications.
mashups
A recent addition to the mobile digital platform is
wearable computing devices
The collection of Web services that are used to build a firm’s software systems constitutes what is known as a service-oriented architecture.
true
Specifications that establish the compatibility of products and the ability to communicate in a network are called
technology standards
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
true
________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.
virtualization
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
total cost of ownerships
The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called
cloud computing
________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.
nanotechnology
The introduction of the minicomputer
allowed computers to be customized to the specific needs of departments or business units.
The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of
quantum computing
IT infrastructure consists of just those physical computing devices required to operate the enterprise.
false
________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.
XML
Sets of loosely coupled software components that exchange information with each other using standard Web communication standards and languages are referred to as
web services
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks.
blade servers
A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web
browser
The network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers is
ethernet
A(n) ________ server is used to communicate between a Web server and an organization’s back-end systems.
application server
Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.
true
Which type of software is created and updated by a worldwide community of programmers and available for free?
open source
SANs maintain a series of servers and provide fee-paying subscribers with space to maintain their Web sites.
false
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down?
scalability
An application server may reside on the same computer as a Web server or on its own dedicated computer.
true
SaaS refers to
hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
All of the following are current hardware platform trends except
unix
As referred to in the text, legacy systems are
traditional mainframe-based business information systems.
Which of the following is not one of the main six factors to consider when evaluating how much your firm should spend on IT infrastructure?
your firm’s organizational culture
The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.
false
At what percent of capacity do most servers operate?
15-20%
Legacy systems are still used because they
are too expensive to redesign
The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of computing platforms is
unix
Which of the following describes Immanuel Kant’s Categorical Imperative?
Correct If an action is not right for everyone to take, it is not right for anyone to take.
Malicious software that is installed secretly on your computer by other applications and that tracks your online movements is called spyware.
true
Computer abuse refers to acts involving the computer that may not be illegal but are considered unethical.
true
Liability is a feature of political systems and allows individuals to recover damages done to them by others.
true
Privacy protection in the United States is ________ in Europe.
much less stringent than
The most common reason business systems fail is
data quality
As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.
slippery-slope rule
The ethical guideline that asks you to put yourself in the place of others, and think of yourself as the object of the decision, is called the Utilitarian Principle.
false
Which of the following is not one of the current key technology trends that raises ethical issues?
increase in multimedia quality
Which of the following best describes intellectual property?
intangible property created by individuals or corporations
The ________ brought copyright law to the Internet age by outlawing the circumvention of technology-based protections of copyrighted materials.
Digital Millennium Copyright Act
“Look and feel” copyright infringement lawsuits are concerned with
the distinction between an idea and its expression.
The Federal Trade Commission FIP principle of Notice/Awareness states that
web sites must disclose their information practices before collecting data.
Any intellectual work product that isn’t based on public knowledge can be classed as a trade secret.
true
A man steals from a grocery store in order to feed his starving family. Which of the following best expresses the Utilitarian Principle in evaluating this situation?
Correct His action is acceptable, because the higher social value is the survival of the family.
Which of the following ailments is caused by tens of thousands of repetitions under low-impact loads?
rsi
In 2010, the FTC added all of the following recommendations to its privacy guidelines except
Correct firms should limit the length of time that any personal data is stored to six months or less.
The extreme difference among different social groups regarding their access to computers and the Internet is called the ________ divide.
digital
In the ________ model of informed consent, personal information can be collected until the consumer specifically requests that his or her data not be collected.
opt-out
________ means that you accept the potential costs and obligations for the decisions you make.
Responsibility
The strength of patent protection is that it
grants a monopoly on underlying concepts and ideas.
As discussed in the chapter, all of the following are steps in the process for analyzing an ethical issue except
Correct assigning responsibility.
Software that manages the resources of the computer is called
operating system software.
In a multi-tiered network
the work of the entire network is balanced over several levels of servers.
Enterprise infrastructure requires software that can link disparate applications and enable data to flow freely among different parts of the business.
true
Which of the following is not one of the NIST defined characteristics of cloud computing?
reduced elasticity
All of the following are cloud computing services except
Correct virtualization as a service.
________ uses individual atoms and molecules to create computer chips and other devices thinner than a human hair.
Nanotechnology
Which type of infrastructure service provides voice and video connectivity to employees, customers, and suppliers?
telecommunications
Which of the following is a leading networking hardware provider?
cisco
TCO refers to the original cost of purchased technology: both hardware and software.
false
The ability to be in many different states at once, dramatically increasing processing power, is a hallmark of
quantum computing.
Interpretations of Moore’s law assert that
Correct computing power doubles every 18 months.
The technology trends exhibited by Portugal Telecom, as discussed in the chapter opening case, illustrate the shift away from green computing.
false
A primary example of centralized processing is client/server computing.
false
Which type of software is created and updated by a worldwide community of programmers and available for free?
open source
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5. Mainframe and Minicomputer.
5,4,3,2,1
Hardware and software acquisition costs account for about ________ percent of TCO.
20
Whereas HTML is limited to describing how data should be presented in the form of Web pages, XML can perform presentation, communication, and data storage tasks.
true
________ provides a standard format for data exchange, enabling Web services to pass data from one process to another.
xml
As referred to in the text, legacy systems are
traditional mainframe-based business information systems.
Application server software is responsible for locating and managing stored Web pages.
false
The introduction of the minicomputer
allowed computers to be customized to the specific needs of departments or business units.
Which of the following factors does not help explain why computing resources today are ever more available than in previous decades?
widespread rejection of technology standards
The collection of Web services that are used to build a firm’s software systems constitutes what is known as a service-oriented architecture.
true
Specifications that establish the compatibility of products and the ability to communicate in a network are called
technology standards.
A(n) ________ server is used to communicate between a Web server and an organization’s back-end systems.
application server
A software tool with a graphical user interface for displaying Web pages and for accessing the Web and other Internet resources is called a Web
browser
Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology implementations?
total cost of ownership
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as
software packages.
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n)
two-tiered client/server architecture.
A SAN is a ________ network.
storage area
The phenomenon of employees using their own devices in the workplace is known as
bod
Which of the following is not an IT infrastructure service component?
operating system software
Java software is designed to run on any computing device, regardless of the specific microprocessor or operating system it uses.
true
Running a Java program on a computer requires
a Java Virtual Machine to be installed on that computer.
In N-tier computing, significant parts of Web site content, logic, and processing are performed by different servers.
true
Quantum computing is implemented primarily with enterprise or ISP servers.
false
Which of the following is the most popular mobile operating system?
android
Which of the following statements about Linux is not true?
Correct It has garnered 20 percent of the server operating system market.
The ________ PC, becoming the standard PC in the Personal Computer Era, uses the Windows operating system software on a computer with an Intel microprocessor.
wintel
Today’s nanotechnology-produced computer transistors are roughly equivalent in size to
a virus
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption.
multicore processor
________ are created by combining and customizing components from different online software applications.
Mashups
A recent addition to the mobile digital platform is
wearable computing devices.
Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.
true
Which type of computing refers to firms purchasing computing power from remote providers and paying only for the computing power they use?
on-
on-demand
________ allows a single computing resource, such as a server, to appear to the user as multiple logical resources.
Virtualization
The process of presenting a set of computing resources (such as computing power or data storage) so that they can all be accessed in ways that are not restricted by physical configuration or geographic location is called
cloud computing
The decision to purchase your own IT assets or rent them from external providers is also referred to as the rent-versus-buy decision.
true
Creative work driven by new knowledge and information is an insignificant part of management responsibility.
false
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation and inventory control, is
operations research
The field that deals with behavioral issues as well as technical issues surrounding the development, use, and impact of information systems used by managers and employees in the firm is called
Management informations systems
Order data for baseball tickets and bar code data are examples of
raw input
Disciplines that contribute to the technical approach to information systems are
operations research, management science, and computer science.
Which of the following objectives best describes the business strategy behind the technologies implemented by the San Francisco Giants, as discussed in the chapter case?
competitive advantage
Thomas Friedman’s declaration that the world was now “flat” meant that
the Internet has reduced the economic advantages of developed countries.
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable information, in a process called
the information value chain
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and
improved decision making
In a business hierarchy, the level that is responsible for monitoring the daily activities of the business is
operational management
Which of the following are key corporate assets?
intellectual property, core competencies, and financial and human assets
An example of an organizational complementary asset is
using the appropriate business model.
A managerial element in the UPS tracking system described in the chapter is
the decision to use automation.
A corporation that funds a political action committee, which in turn promotes and funds a political candidate who agrees with the values of that corporation, could be seen as investing in which main category of complementary assets?
social
Laws and regulations creating fair, stable market environments are examples of complementary social assets required to optimize returns from IT investments.
true
Data management technology consists of the
software governing the organization of data on physical storage media.
Verizon Corporation’s use of a Web-based digital dashboard to provide managers with precise real-time information illustrates which business objective?
improved decision making
Which of the following roles in a firm would be least affected by using mobile devices to access firm information systems?
production workers
Which level of the organization are ESS specifically designed to serve?
senior management
Supply chain management systems are more externally oriented than enterprise systems.
true
________ systems are especially suited to situations in which the procedure for arriving at a solution may not be fully defined in advance.
decision-support
Using the Internet to buy or sell goods is called
e-commerce
________ enable management to make better decisions regarding organizing and scheduling sourcing, production, and distribution.
SCMs
Which of the following types of system helps coordinate the flow of information between the firm and its suppliers and customers?
extranet
All of the following statements regarding IBM Notes are true except which one?
it began as an e-mail and messaging client
A(n) ________ is typically a major source of data for other systems.
transaction processing system
What is the most important function of an enterprise application?
enabling business functions and departments to share information
Which of the following statements about collaboration is not true?
Successful collaboration can be achieved through technology regardless of the organization’s culture or structure.
The four major enterprise applications are
enterprise systems, SCMs, CRMs, and KMSs.
Which of the following is a firm’s CPO responsible for?
ensuring that the company complies with existing data privacy laws