Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and
Improved decision making
Which of the following choices may lead to competitive advantage: (1) new products, services, and business models; (2) charging less for superior products; (3) responding to customers in real time?
1, 2, and 3
An information system can be defined technically as a set of interrelated components that collect, process, store, and distribute information to support
decision making and control in an organization.
The three activities in an information system that produce the information organizations use to control operations are
input, processing, and output.
Producing bills of materials is a business process within the ___________ function.
manufacturing and production
Which type of system would you use to change a production schedule if a key supplier was late in delivering goods?
To monitor the status of internal operations and the firm's relations with the external environment, managers need _________ systems.
A firm can be said to have competitive advantage when they have higher stock market valuations than their competitors.
In an efficient customer response system, digital answering systems are used to monitor and respond to customer inquiries.
Professionals take on special rights on obligations because of their special claims to knowledge, wisdom, and respect.
Privacy is the right to be left alone when you want to be, without surveillance or interference from other individuals or organizations.
A cookie is a small file containing information about you and your Web activities that I deposited on your hard disk by a web site.
The introduction of new information technology has a
ripple effect raising new ethical, social, and political issues.
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
property rights and obligations.
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
quality of life.
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _____________
networking advances and the internet
Advances in data storage techniques and rapidly declining storage costs have
made routine violations of privacy cheap and effective.
The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.
An application server may reside on the same computer as a Web server or on its own dedicated computer.
Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.
Place the following eras of IT infrastructure evolution in order, from earliest to most recent: (1) Cloud Computing Era (2) Client/Server, (3) Enterprise Era, (4) Personal Computer, and (5) Mainframe and Minicomputer.
4, 5, 3, 2, 1
A grouping of characters into a word, a group of words, or a complete number is called a record.
Program-data dependence refers to the coupling of data stored in files and software programs that use this data such that changes in programs require changes to the data.
Which of the following non-digital data storage items is most similar to a database?
library card catalog
A hub is a networking device that connects network components and are used to filter and forward data to specified destinations on the network.
A device that acts as a connection point between computers and can filter and forward data to a specified destination is called a
The Internet is based on which three key technologies?
Client/server computing, packet switching, and the development of communications standards for linking networks and computers.
The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called
Which of the following is NOT a characteristic of packet switching?
Packet switching requires point-to-point circuits
The potential for unauthorized access is usually limited to the communications lines of a network.
Computers using cable modems to connect to the internet are more open to penetration than those connecting via dial-up.
Wireless networks are vulnerable to penetration because radio frequency bands are easy to scan.
One form of spoofing involves forging the return address on an email so that the emil message appears to come from someone other than the sender.
_______ refers to policies, procedures, and technical measures used to prevent unauthorized access, alternation, theft, or physical damage to information systems.