How can we help?

You can also find more resources in our Help Center.

315 terms

BUS 401 Final Exam

STUDY
PLAY
You have been hired as a security consultant for a legal firm. Which of the following
constitutes the greatest threat, in terms of security, to the firm?
Employees
Based on your reading of the CardSystem's security breach and the text, what category
of malware was used on CardSystem's network?
Trojan horse
A digital certificate system:
uses third-party CAs to validate a user's identity.
In this method of encryption, a single encryption key is sent to the receiver so both
sender and receiver share the same key.
Symmetric key encryption
Currently, the protocols used for secure information transfer over the Internet are:
SSL, TLS, and S-HTTP.
Most antivirus software is effective against:
only those viruses already known when the software is written.
________ use scanning software to look for known problems such as bad passwords,
the removal of important files, security attacks in progress, and system administration
errors.
Intrusion detection systems
In this technique, network communications are analyzed to see whether packets are part
of an ongoing dialogue between a sender and a receiver:
Stateful inspection
The text's discussion of the security enhancements of Monsanto Co and Clarion Health
Partners illustrates which of the following drawbacks to using passwords for
authentication?
Poor password systems are a costly and insecure procedure.
A firewall allows the organization to:
enforce a security policy on traffic between its network and the Internet.
Biometric authentication:
can use a person's face as a unique, measurable trait.
A token is a:
gadget that displays passcodes
Rigorous password systems:
may hinder employee productivity.
An MIS audit must be conducted by someone who:
Has a thorough understanding of the entire system to be audited
Smaller firms can outsource security functions to:
MSSPs.
Methods to make computer systems recover more quickly after mishaps is called:
Recovery oriented computing.
High-availability computing:
Helps firms recover quickly from a crash.
Online transaction processing requires:
fault-tolerant computer systems.
Downtime refers to:
periods of time in which a computer system is not operational.
A CSO is a:
chief security officer.
An analysis of the firm's most critical systems and the impact a system's outage would
have on the business is included in a(n):
business impact analysis.
Statements ranking information risks are included in a(n):
Security policy.
Analysis of an information system that rates the likelihood of a security incident
occurring and its cost is included in a(n):
Risk assessment
Electronic evidence on computer storage media that is not visible to the average user is
called:
Ambient data.
What is the key issue in information systems security and control?
Intelligent management policies
The most common type of electronic evidence is:
E-mail.
The Gramm-Leach-Bliley Act:
Requires financial institutions to ensure the security of customer data.
The Sarbanes-Oxley Act:
Imposes responsibility on financial information.
ISO 17799:
Specifies best practices in information systems security and control.
The HIPAA act of 1996
Outlines medical security and privacy rules.
Policies, procedures, and tools for managing the retention, destruction, and storage of
electronic records is called:
ERM
How do software vendors correct flaws in their software after it has been distributed?
Issue patches.
Tricking employees to reveal their passwords by pretending to be a legitimate member of
a
Social engineering.
Spamming is an example of:
Computer abuse.
Evil twins are
Bogus wireless networks that look legitimate to users.
Pharming involves:
Redirecting users to a fraudulent Web site even when the user has typed in the
correct address in the Web browser
Phishing involves:
Setting up fake Web sites to ask users for confidential information.
Phishing is a form of :
Spoofing.
Which of the following is NOT an example of a computer used as a target of crime?
Illegally accessing stored electronic communication.
In your reading of the text's discussion of the experiences of Jersey Joe, Akamai, and
Protx Ltd, what is the greatest protection against bot attacks?
Having individuals use adequate anti-virus protection
The approach taken by Akamai Technologies when it discovered its servers were under
attack illustrates that:
Enforcing security is a complex endeavor that involves multiple approaches.
How do hackers create a botnet?
Infecting corporate servers with "zombie" Trojan horses that allow undetected access
through a back door.
In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor.
On the vendor's site, a small program called Mitglieder was downloaded to the user's
machine. The program enabled outsiders to infiltrate the user's machine. What type of
malware is this an example of?
Trojan horse
A key logger is a type of:
Spyware.
Redirecting a Web link to a different address is a form of :
Spoofing.
Using numerous computers to inundate and overwhelm the network from numerous
launch points is called a:
DDoS.
Sobig.F and Netsky.P are:
"Worm" type viruses that arrive attached to e-mail and spread from computer to
computer.
An independent computer program that copies itself from one computer to another over a
network is called a:
Worm
What software vulnerability does Wi-Fi present?
Use of the SSID as a password
The main security problem on the Internet is:
Hackers.
Computers linked to the Internet are more vulnerable if they are linked through:
a cable modem and a DSL line
The Internet poses specific security problems because:
It was designed to be easily accessible.
Security challenges specifically faced by network servers include:
Theft and fraud
Security challenges posed by the communications between layers in a client/server
environment are:
Tapping, sniffing, message alteration
All of the methods, policies, and organizational procedures that ensure the safety of the
organization's assets, the accuracy and reliability of its accounting records, and
operational adherence to management standards refers to:
Controls
Large amounts of data stored in electronic form are _____________ than the same data
in manual form.
Vulnerable to many more kinds of threats
Automated data are more susceptible to destruction, fraud, error, and misuse because
information systems concentrate data in computer files that:
Have the potential to be accessed by large numbers of people and by groups outside of
the organization.
Policies, procedures, and technical measures used to prevent unauthorized access,
alternation, theft, or physical damage to information systems refers to:
Security
What is the most far-reaching effect of identity theft?
Lowering of revenues and profits due to public mistrust of e-commerce safety.
The fact that phishing is growing at an explosive rate indicates what?
The increasing use of the Internet for e-commerce is a factor in drafrom larger numbers of criminals.
Which type of network would be most appropriate for a business that comprised three
employees and a manager located in the same office space, whose primary need is to
share documents?
Peer-to-peer network
What is a business value of RSS?
Lowers costs and improves efficiency by minimizing Internet access
What is the business value of an intelligent agent shopping bot?
Product differentiation
The need in some cases for employees to have access to sexually explicit material on the
Internet, such as medical researchers, suggests that:
Companies need to base their Internet use policies on the needs of the organization
and culture.
Based on your reading of the examples in the chapter, what would be the best use of
RFID for a business?
Supply chain management
Which technologies are helping Transalta maintain its equipment?
RFID and wireless technology
RFID tag costs are currently:
About 19 cents
Automated toll-collection systems use these types of RFID tags:
High frequency
In a RFID system, a(n) ____________________ is electronically programmed with
information that can uniquely identify an item, such as an electronic code.
Transponder
EV-DO provides wireless access to the Internet over a cellular network at an average
speed of:
300 - 500 Kbps.
The WiMax standard can transmit up to a distance of:
31 miles.
The IEEE standard for the WiMax is:
IEEE 802.16.
One or more access points positioned on a ceiling, wall, or other strategic spot in a public
place to provide maximum wireless coverage for a specific area are referred to as:
Hotspots
Why are products built for 802.11b and 802.11g compatible?
They use the same frequency band
Each access point and its wireless devices are known as a:
BSS
A Wi-Fi system can operate in two different modes. Ad-hoc mode is also known as:
Peer-to-peer mode.
The Wi-Fi 802.11b standard can transmit up to:
Can transmit up to 11 Mbps in the unlicensed 2.4-GHz band and has an effective
distance of 30 to 50 meters.
The Wi-Fi 802.11a standard can transmit up to:
54 Mbps in the unlicensed 5-GHz frequency range
Bluetooth can be used to link up to __________________ devices within a 10-meter area
using low-power, radio-based communication.
eight
Bluetooth is the popular name for this IEEE standard:
IEEE 802.15.
To deliver Internet content, I-mode uses:
Compact HTML
The most appropriate wireless networking standard for creating PANs is:
Bluetooth
Which cellular network has enough transmission capacity for video, graphics, and other
rich media in addition to voice?
3G networks
CDMA
Transmits over several frequencies
Wireless cellular phone systems are entering this generation of networks:
3G
A VPN:
Is an encrypted private network configured within the public Internet
For corporations, one of the drawbacks to the worldwide explosion of e-mail use is:
Too much bandwidth used by e-mails
Which technology uses the Internet protocol to deliver voice information in digital form
using packet-switching?
VoIP
A network that links a business with its customers, suppliers, and other business partners
is called:
Extranet.
To keep internal data secure, a company employing an extranet must be sure to put a(n)
_________________ in place.
firewall
Instant messaging is a type of:
chat service.
The paid sponsored links delivered with search results is a form of:
search engine marketing.
What technology allows people to have content pulled from Web sites and fed
automatically to their computers?
RSS
The open-source Web server that controls 70 percent of the market is:
Apache HTTP server
Together, a protocol prefix, a domain name, a directory path, and a document name, are
called a:
Uniform resource locator
Web browser software requests Web pages from the Internet using which protocol?
HTTP
The Internet is based on client/server technology in which:
All the data resides on servers
Which of the following services enables logging on to one computer system and working
on another?
Telnet
The IPv6 is being developed in order to:
Create more IP addresses
Which of the following services enables discussion groups on electronic bulletin boards?
Usenet newsgroups
Which organization helps define the overall structure of the Internet
IAB
The child domain of the root is the:
Top-level domain
In the domain name "http://myspace.blogging.com", what are the root, top-level, second-level, and third-level domains, respectively?
".", com, blogging, myspace
What service converts IP addresses into more recognizable alphanumeric names?
DNS
Which protocol is the Internet based on?
TCP/IP
T lines:
are very-high-speed data lines typically leased from long-distance telephone
companies.
ISDN:
integrates voice, data, image, and video services.
Digital subscriber lines:
Operate over existing telephone lines to carry voice, data, and video
The most common Ethernet topology is:
Bus.
Which transmission technology parcels information into fixed 53-byte cells?
ATM
In the domain network model:
a dedicated server manages the network computers.
The most common LAN operating systems are:
Windows, Linux, and Novell
A bus network:
Links a number of computers by a single circuit with all messages broadcast to the
entire network.
A peer-to-peer network architecture:
Gives equal power to all computers on the network and is used primarily in small
networks.
A network that covers a large geographic area is most commonly referred to as a(n):
Wide area network.
A network that spans a city, and sometimes its major suburbs as well, is an example of a:
MAN
A LAN:
Connects computers and peripheral devices located close to each other, often in the
same building.
In a bus network:
Signals are broadcast in both directions to the entire network
All network components connect to a single hub in a:
Star network
Which type of network treats all processors equally, and allows peripheral devices to be
shared without going to a separate server?
Peer-to-peer
TCP/IP stands for:
transmission Control Protocol/Internet Protocol.
Which type of network is used to connect digital devices within a half-mile or 500-meter
radius?
LAN
The total amount of digital information that can be telecommunications medium is measured in:
Bps.
Bandwidth is:
the difference between the highest and lowest frequencies that can be accommodated
on a single channel.
_____________ work by using radio waves to communicate with radio antennas placed
within adjacent geographic areas
Cell phones
The difference between the highest and lowest frequencies that can be accommodated on
a single channel is called its:
Bandwidth.
What type of transmission technology is used in relay stations for terrestrial microwave
transmission?
Satellite
Which type of signals follow a straight line and do not bend with the curve of the Earth?
Microwave
Which type of network can transmit all types of traffic-voice, data, and video-over fiber
cables and provide the massive bandwidth for new types of services and software?
Optical
Multiplexing can be defined as a:
technology that enables a single communications channel to carry data transmissions
from multiple sources simultaneously.
BP Amoco uses __________________ for real-time data transfer of oil field exploration
data gathered from searches of the ocean floor.
Satellites
Which technology will enable communications service providers to add transmission
capacity to an existing fiber-optic network without having to lay more fiber-optic cable?
DWDM
To use an analog telephone system for sending digital data, you must use:
A modem
Data is sent through the fiber-optic cable by a:
Laser device
These signals are represented by a continuous waveform:
Analog
The part of a network that handles the major traffic is:
Backbone.
A communications medium that uses one or more copper wires surrounded by thick
insulation is:
Coaxial cable
This is the simplest and slowest type of telecommunications media:
Twisted-pair
In a telecommunications network architecture, a protocol is:
A standard set of rules and procedures for control of communications in a network.
c. A communications service for microcomputer users.
In TCP/IP, IP is responsible for:
Disassembling and reassembling of packets during transmission
The four layers of the TCP/IP reference model are:
Application layer, transport layer, Internet layer, network interface layer
Which of the following is NOT a characteristic of packet switching?
Requires dedicated circuits
The telephone system is an example of a:
Circuit-switched network
The method of slicing digital messages into parcels, transmitting them along different
communication paths, and reassembling them at their destinations is called:
Packet switching
The Internet is based on the following three key technologies
Client/server computing, packet switching, and the development of widely used
communications standards for linking networks and computers.
The most important communication standard today for linking disparate computers and
networks is:
Transmission Control Protocol/Internet Protocol (TCP/IP).
Which device connects multiple computers in a network?
Network hub
A device that acts as a connection point between computers and can filter and forward
data to a specified destination is called a:
Switch
A computer on a network that performs important network functions for client
computers, such as serving up Web pages, storing data, and storing the network
operating system, is called a:
Server computer
The case study of Dartmouth Coof wireless technology to:
Save costs
What is the first step you should take in managing data for a firm?
Identify the data needed to run the business
Which was the greater information system?
Poor information policies
Detecting and correcting data in a database or file that are incorrect, incomplete,
improperly formatted, or redundant is called:
Data scrubbing
Which common database challenge is illustrated by the text's discussion of downloading
digital music?
Data accuracy
The confusion created by __________________ makes it difficult for companies to
create customer relationship management, supply chain management, or enterprise
systems that integrate data from different sources.
data redundancy
An alternative to using application server software for interfacing between a Web server
and back-end databases is:
CGI.
As described in the chapter text, which of the following strategies best describes Banco
de Credito Peru's tactics in overcoming the competitive forces it was facing?
Strengthen customer and supplier intimacy
As described in the chapter text, which competitive force was Banco de Credito Peru
facing?
Threat of new entrants
In terms of data relationships, associations refers to:
occurrences linked to a single event.
Data mining is a tool for allowing users to:
find hidden relationships in data.
OLAP Is a tool for enabling:
users to obtain online answers to ad hoc questions in a rapid amount of time.
The tool that enables users to view the same data in different ways using multiple
dimensions is:
OLAP
Tools for consolidating, analyzing, and providing access to vast amounts of data to help
users make better business decisions are known as:
Business intelligence
A data mart usually can be constructed more rapidly and at lower cost than a data
warehouse because:
A data mart typically focuses on a single subject area or line of business.
A data warehouse is composed of:
Historic and current internal data
Which of the following database types is useful for storing java applets as well as typical
business data?
object-relational DBMS
The type of database management approach that can handle multimedia is the:
object-oriented DBMS.
DBMS's typically include report-generating tools in order to:
display data in an easier-to-read format.
An automated or manual file that stores information about data elements and data
characteristics such assecurity is the:
data dictionary.
The data dictionary serves as an important data management tool by:
creating an inventory of data contained in the database.
The most prominent data manipulation language today is
SQL.
The specialized language programmers use to add and change data in the database is
called :
data manipulation language.
The project operation:
Creates a subset consisting of columns in a table.
The join operation:
Combines relational tables to provide the user with more information than is
otherwise available.
The select operation:
creates a subset consisting of all records in the file that meets stated criteria.
In a relational database, the three basic operations used to develop useful sets of data are:
select, project, and join.
Microsoft SQL Server is a(n):
DBMS for midrange computers.
DB2 is a(n):
mainframe relational DBMS.
Access is a:
Desktop relational DBMS.
Oracle Database Lite is a(n):
DBMS for small handheld computing devices.
DBMS for midrange computers include all of the following EXCEPT:
Microsoft Access.
The logical view:
presents data as they would be perceived by end users.
A DBMS:
makes the physical database available for different logical views.
The process of streamlining data to minimize redundancy and awkward many-to-many
relationships is called:
normalization.
A table that links two tables that have a many-to-many relationship is called a:
intersection relation.
A one-to-many relationship between two entities is symbolized in a diagram by a:
line that ends with a crow's foot topped by a short mark.
A one-to-one relationship between two entities is symbolized in a diagram by a:
line that ends in two short marks.
A schematic of the entire database that describes the relationships in a database is called
a:
entity-relationship diagram.
Duplicate data in multiple data files is:
data redundancy.
A field identified in a record as holding the unique identifier for that record is called the:
key field.
A field identified in a table as holding the unique identifier of the table's records is called
the:
primary key.
In a relational database, a record is called a(n):
tuple.
In a table for customers, the information about a single customer would reside in a
single:
row.
The most basic business database is comprised of:
five tables: a table for customers, a table for employees, a table for suppliers, a table
for parts, and a table for sales.
A characteristic or quality describing an entity is called a(n):
attribute.
What are the relationships that the relational database is named for?
Relationships between entities
The type of logical database model that treats data as if they were stored in two-
dimensional tables is the:
relational DBMS.
Which of the following best illustrates the relationship between entities and attributes?
The entity CUSTOMER with the attribute PURCHASE
An example of a pre-digital database is :
a library's card-catalog.
What category best describes 7-11's new information system?
MIS
For which function was 7-11's new information system geared toward?
Supply chain management
Which of the four generic strategies against competitive forces did 7-11 need to
implement in order to manage the disadvantages it faced?
Low-cost leadership
You have been hired by Inspiration Inc, to help improve their profit margin. Inspiration
Inc. is a business communications consultancy that services many clients in different
industries throughout the U.S. The end products of the company are customized
recommendations for the best use of a client's existing resources for improving
internal communications, typically delivered via documentation in different media.
The company has approximately 100 consultants all of whom are located in their
central headquarters in Chicago. What system do you recommend to improve the
company's business processes and increase their profit margin?
Extranet, to enable quick collaboration over the Internet , minimize the time
spent communicating with the client, and minimize the amount of paperwork
needed
You have been hired by a non-profit agency to implement a system to handle their
donations. Event fund-raisers need to be able to quickly access a donor's information
and history. The marketing department needs to be able to create customized mailing
lists, in order to send different messages to different types of donors. What system(s) will best meet these needs?
TPS with MIS
What is one of the biggest drawbacks in having separate information systems for
separate business functions
Redundancy of information
You work for a highly successful advertiser that is just about to expand nationally. Of
utmost importance will be finding a way to store and disseminate their client's
constantly updating branding and style guides, which include multiple image files
and text documents, to all of their branches. What system will best serve these needs?
An extranet with KMS capabilities
You manage the Information Systems department at a small startup Internet advertiser.
You need to set up an inexpensive system that allows customers to see real-time
statistics such as views and click-throughs about their current banner ads. Which type
of system will most efficiently provide a solution?
Extranet
What does Danaher Corporation's implementation of e-Kanban illustrate?
Implementing technical solutions is a continuous process, needing the
measurement of benefits against drawbacks.
What is the most important benefit of an enterprise application:
enabling business functions and departments to share information.
The advantage of a decentralized arrangement of the information services function, in
which each functional area of the business has its own information systems
department is:
systems are built that directly address that function's business needs.
Policies that determine which information technology will be used, when, and how are
provided by:
IT standards services
Development and support services for a firms' business systems are provided by:
application software services.
A __________ is a senior manager who oversees the use of IT in the firm.
CIO
The principal liaison between the information systems groups and the rest of the
organization is a/an:
Systems analyst
The use of digital technology and the Internet to execute the major business processes in
the enterprise is called
e-business
You would recommend that a system interface use a portal when:
employees need to collaborate with suppliers and vendors
Buying or selling goods over the Internet is called:
e-commerce
What type of information system is an intranet most easily adapted to:
KMS
Different firms can work collaboratively on product design, marketing, and production
through
An extranet
Which type of system would you use to determine the five suppliers with the worst
record in delivering goods on time?
MIS
Which type of system would you use to change a production schedule if a key supplier
was late in delivering goods?
TPS
Which type of system would you use to forecast the return on investment if you used
new suppliers with better delivery track records?
DSS
Which type of system would you use to determine what trends in your supplier's industry
will affect your firm the most in five years?
ESS
______________________ uses a set of integrated applications to address all aspects of
he customer relationship.
CRM
__________________________ is the process that integrates supplier, manufacturer,
distributor, and customer logistics processes.
Supply-chain management
A (an) _______________________ collects data from various key business processes
and storebusiness.
enterprise system
These systems are designed to support organization-wide process coordination and
integration.
Enterprise applications
These systems often deliver information to senior executives through a portal, which
uses a Web interface to present integrated personalized business content:
executive support systems.
ESS are specifically designed to serve this level of the organization:
senior management
Decision-support systems are often referred to as:
business intelligence systems.
These systems have more analytical power than other types of systems:
decision-support systems.
Executive support systems are information systems that support the:
long-range planning activities of senior management.
These systems allow users to change assumptions, ask new questions, and include new
data:
decision-support systems.
These systems are especially suited to situations in which the procedure for arriving at a
solution may not be fully predefined in advance:
decision-support systems.
Decisions that are unique, rapidly changing, and not easily specified in advance are best
suited to this type of system:
decision-support
These systems are typically a major source of data for other systems:
transaction processing systems.
These systems are designed to summarize and report on the company's basic operations.
management information systems
Management-level systems are information systems that support the:
decision-making and administrative activities of middle managers.
Managers need __________ to monitor the status of internal operations and the firm's
relations with the external environment.
transaction processing systems
The principal purpose of __________________ is to answer routine questions and to
track the flow of transactions through the organization.
operational-level systems.
The term "management information systems" designates a specific category of
information systems serving:
middle management functions
A relocation control system that reports summaries on the total moving, house-hunting,
and home financing costs for employees in all company divisions would fall into the
category of:
management-level systems.
A computerized system that performs and records the daily dealings necessary to conduct
business is classified as a(n):
transaction-level system
TPSs are the basic business systems that serve which level of the organization?
operational.
Compensation analysis is an example of:
human resources information systems.
A finance and accounting information system aids operational management with:
accounts receivable.
Budgeting is typically a feature of an information system serving:
middle management.
Senior management uses finance and accounting information systems to:
forecast sales trends.
Equipment scheduling and facilities maintenance are functions of:
Manufacturing and production systems.
A sales and marketing information system aids middle management employees in:
analyzing sales performance.
A sales and marketing information system aids operational management in:
tracking sales.
Pricing analysis is an example of:
a sales and marketing information system serving management.
Market research is an activity associated with the:
Sales and marketing function
Promoting the organization's products or services is a responsibility of the:
sales and marketing function.
Key actors in a business's immediate environment include:
regulations.
The three principal levels of hierarchies within a business organization are:
senior management, middle management, and operational management.
Employees that assist with paperwork at all levels of the firm are called:
data workers.
Which of the following is a cross-functional business process?
fulfilling a customer order.
The five basic entities that make up any business are suppliers, customers, employees,
products and services, and:
invoices and payments.
How would you best categorize the types of systems Kia
implemented in their defect early warning system?
An MIS to create reports from existing TPSs and a DSS for high-level analysis and forecasts.
Kia's difficulties in getting a complete picture of defects in their cars illustrates:
the challenges posed by having multiple information systems that are not linked.
In the UPS case the company's culture places service to the customer among the company's
highest business objectives. Based on your reading of Chapter 1, why is "culture" an
important factor to consider when building information system solutions to business
problems?
the business culture provides the vision and inspiration for information system
solutions
Assume you work for a package delivery service in a major metropolitan area, and that the
business has been losing customers for several years. You have been asked to find a solution
to this problem, perhaps one which uses modern information technologies. What is the
correct way to proceed:
identify the problem, design alternative solutions, choose the best solution, and then
implement the solution.
The fact that online advertising revenues are growing at 30% a year, while offline traditional
advertising is growing at about 5% a year, suggests that:
the Internet is transforming the traditional advertising business model.
Based on your reading of the Sonic case and other examples in the chapter, if you were asked
to formulate a plan for a regional drive-in restaurant chain's efforts to use information
technology to attract customers, what would be the best use of information technology from
the list below:
use IT to achieve customer intimacy.
What was the most important impact of Major League Baseball's Web site development
efforts:
strengthened the relationship with customers and suppliers.
For the U.S., the most common and successful offshore outsourcing has been:
technical positions in information systems.
Financial managers work directly with ______________ to ensure investments in
information systems help achieve corporate goals.
senior managers
Operations management as a discipline is directly relevant to three occupational categories:
industrial production managers, operations analysts, and administrative service
managers.
Types of marketing managers include:
promotion managers and sales managers.
Promoting the organization's products and services is a business function of:
sales and marketing.
Maintaining the organization's financial records is a business function of:
accounting.
One of the very first business applications of information systems was:
accounting.
Sonic's use of point-of-sales terminals to track purchasing trends at different
outlets is an example of:
using information systems to achieve customer intimacy.
An information skill important for a marketing major would be
an understanding of product management enterprise systems.
An information skill important for an accounting major would be:
an understanding of system and network security issues.
An example of a business using information systems for survival is:
China Telecom's enterprise system designed to comply with international reporting
regulations.
An example of a business using information systems to attain competitive advantage is:
Blockbuster's creation of a new online movie-rental system similar to that of Netflix.
An example of a business using information systems to create new products and services is:
MLB's Web sites for online "fantasy" games.
One of the most frequent errors in problem solving is:
rushing to judgment.
A major criterion in deciding the most important perspectives of a business problem is:
usefulness.
The final step in the four-step model of business problem solving is:
implementation.
The failure of NASA's initial solution to preventing the space shuttle shedding foam
illustrates:
the continuous nature of problem solving.
In choosing the best solution for a business problem, one of the most important
considerations is:
existing resources and skills.
Flapjack Flats, a new pancake chain, is having difficulty finding pancake chefs. This is a
business problem that falls into the:
organizational dimension
The owners of Speed-EZ, a new bike messenger service, are concerned about how they will
manage their messengers once they have left the office. This is a business problem that falls
into the:
people dimension.
Poor business processes and unsupportive culture are examples of which dimension of
business problem:
organizational
Aging hardware and outdated software are examples of which dimension of business
problem?
Technical
Legal and regulatory compliance is an example of which dimension of business problem?
People
Inadequate data management is an example of the ___________ dimension of business
problems.
technical
The first step in the four-step model of business problem solving is:
identifying the problem
An intranet uses:
internet technology within the boundaries of the firm
Networking and telecommunications technolmanage them, constitute an organization's:
IT infrastructure.
The hardware and software used to transfer data in an organization is called:
networking and telecommunications technology.
Data management technology consists of:
the software governing the organization of data on physical storage media.
Business processes:
include informal work practices.
The fundamental set of assumptions, values, and ways of doing things, that has been
accepted by most of a company's members is called its:
culture.
A hierarchy:
is a pyramid structure or rising authority and responsibility.
In a hierarchical organization, the upper levels consist of:
managerial, professional, and technical workers.
The field that deals with behavioral issues as well as technical issues surrounding the
development, use, and impact of information systems used by managers and employees in
the firm is called:
management information systems.
Electronic computers and related software programs are the technical foundation, the tools
and materials, of:
modern information systems.
Converting raw data into a more meaningful form is called:
processing.
Output:
transfers processed information to the people who will use it or to the activities for which it will be used.
The average number of tickets sold daily online is an example of:
meaningful information.
Order data for baseball tickets and bar code data are examples of:
raw input.
The three activities in an information system that produce the information organizations use to control operations are:
input, processing, and output.
An information system can be defined technically as a set of interrelated components that
collect (or retrieve), process, store, and distribute information to support:
decision making and control in an organization
What term is used to refer to all of the computer-based information systems used by
organizations and their underlying technologies?
Information technology
The move of retail banking to use ATMs after Citibank unveiled its first ATMs illustrates the information system business objective of:
survival.
Verizon's implementation of a Web-based digital dashboard to provide managers with real-
time information such as customer complaints is an example of:
improved decision-making.
Which of the following choices may lead to competitive advantage (1) new products,
services, and business models; (2) charging less for superior products; (3) responding to
customers in real-time?
1, 2, and 3
The use of information systems because of necessity is:
survival
Dell Computer's use of information systems to improve efficiency and implement "mass
customization" techniques to maintain consistent profitability and an industry lead illustrates
which business objective?
Competitive advantage
The six important business objectives of information technology are new products, services,
and business models; customer and supplier intimacy; survival; competitive advantage,
operational excellence, and:
improved decision making.
One of the recent critical challenges facing Major League Baseball was:
decreasing ticket sales.