MGMT 320 Midterm Study Guide 1

71 terms by vjselv00

Create a new folder

Advertisement Upgrade to remove ads

75 Questions on all of what we've went over in class.

Internet advertising is growing at a rate of more than 25 percent a year.

True

Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.

True

A fully digital firm produces only digital goods or services.

False

A business model describes how a company produces, delivers, and sells a product or service to create wealth.

True

Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.

False

The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and

Improved decision making

The use of information systems because of a necessity describes the business objective of

Survival

Which of the following choices may lead to competitive advantage: (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time?

1, 2, and 3

An information system can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support

decision making and control in an organization.

The three activities in an information system that produce the information organizations use to control operations are

input, processing, and output.

Identifying customers is a responsibility of the __________ function.

sales and marketing

Producing bills of materials is a business process within the ___________ function.

manufacturing and production

Which of the following is an example of a cross-functional business process?

creating a new product

Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?

TPS

To monitor the status of internal operations and the firm's relations with the external environment, managers need _________ systems.

transaction processing

A firm can be said to have competitive advantage when they have higher stock market valuations than their competitors.

True

The competitive forces model was created for today's digital firm.

False

Customers are one of the competitive forces that affect an organization's ability to compete.

True

A transparent marketplace means that there is high product differentiation.

False

In an efficient customer response system, digital answering systems are used to monitor and respond to customer inquiries.

False

Advances in data storage have made routine violation of individual privacy more difficult.

False

Professionals take on special rights on obligations because of their special claims to knowledge, wisdom, and respect.

True

Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.

True

Web sites use "cookies" in order to obtain the names and addresses of their visitors.

False

A cookie is a small file containing information about you and your Web activities that I deposited on your hard disk by a web site.

True

Information systems

raise new ethical questions

The introduction of new information technology has a

ripple effect raising new ethical, social, and political issues.

In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of

property rights and obligations.

In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of

quality of life.

The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _____________

networking advances and the internet

Advances in data storage techniques and rapidly declining storage costs have

made routine violations of privacy cheap and effective.

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called

profiling

Accepting the potential costs, duties, and obligations for the decisions you make is referred to as

responsibility

The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as

liability

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

accountability

IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.

False

Client/server computing is a widely used form of centralized processing.

False

Application server software is responsible for locating and managing stored Web pages.

False

An application server may reside on the same computer as a Web server or on its own dedicated computer.

True

Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.

True

The mainframe market has grown steadily over the past decade.

True

The operating system is used to manage the computer's activities.

True

Which of the following is NOT an IT infrastructure services component?

operating system software

Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) Cloud Computing Era (2) Client/Server, (3) Enterprise Era, (4) Personal Computer, and (5) Mainframe and Minicomputer.

4, 5, 3, 2, 1

The introduction of the minicomputer

all of the above

A grouping of characters into a word, a group of words, or a complete number is called a record.

False

Each characteristic or quality describing a particular entity is called an attribute.

True

Program-data dependence refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data.

True

A DBMS reduces data redundancy and inconsistency by

minimizing isolated files with repeated data.

A characteristic or quality describing an entity is called a(n)

attribute

Which of the following non-digital data storage items is most similar to a database?

library card catalog

Telephone networks are fundamentally different from computer networks.

True

Increasingly, voice, video, and data communications are all based on Internet technology.

True

To connect two computers together in the same office, you must have a computer network.

True

An NOS must reside on a dedicated server computer in order to manage a network.

False

A hub is a networking device that connects network components and are used to filter and forward data to specified destinations on the network.

False

A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a

switch

The Internet is based on which three key technologies?

Client/server computing, packet switching, and the development of communications standards for linking networks and computers.

The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called

packet switching

The telephone system is an example of a ___________ network.

circuit-switched

Which of the following is NOT a characteristic of packet switching?

Packet switching requires point-to-point circuits

In TCP/IP, IP is responsible for

disassembling and reassembling of packets during transmission.

The potential for unauthorized access is usually limited to the communications lines of a network.

False

Computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up.

True

Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.

True

The range of Wi-Fi networks can be extended up to two miles by using external antennae.

False

Viruses can be spread through email.

True

Computer worms spread much more rapidly than computer viruses.

True

One form of spoofing involves forging the return address on an email so that the emil message appears to come from someone other than the sender.

True

_______ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.

"Security"

_______ refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards.

"Controls"

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set