MIS Q&Anws

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

1.

The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and:

a. b. c. d.

improved flexibility. improved decision making. improved business practices. improved efficiency.

2. Verizons implementation of a Web-based digital dashboard to provide managers with real-time information such as customer complaints is an example of:

a. b. c. d.

improved flexibility. improved decision making. improved efficiency. customer and supplier intimacy.

3. An information system can be defined technically as a set of interrelated components that collect (or retrieve), process, store, and distribute information to support:

a. b. c. d.

decision making and control in an organization. communications and data flow. managers analyzing the organizations raw data. the creation of new products and services.

4. A managerial element in the UPS tracking system described in the chapter is

A) taking inventory. B) providing package status reports to customers. C) the decision to use automation. D) in-house package tracking software.

5. Which field of study focuses on both a behavioral and technical understanding of information systems?

a. b. c. d.

Sociology Operations research Economics Management information systems

6. Which of the following are key corporate assets?

A) intellectual property, core competencies, and financial and human assets B) production technologies and business processes for sales, marketing, and finance C) knowledge and the firm's tangible assets, such as goods or services D) time and knowledge

7. Apple Computer dominates the online legal music sales industry primarily because of a failure of recording label companies to:

a. b. c.

invest in technology. adopt a new business model. invest in complementary assets.

d.

modernize their information value chain.

8. An example of a business using information systems to attain operational excellence is:

a. b. c. d.

Wal-Marts RetailLink system. the Mandarin Oriental hotels customer-preference tracking system. Verizons Web-based digital dashboard. Apple Inc.s iPod.

9. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organizations:

a. b. c. d.

data management environment. networked environment. IT infrastructure. information system.

10. Data management technology consists of:

a.

the physical hardware and media used by an organization for storing data.

b. the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. c. d. the software governing the organization of data on physical storage media. the hardware and software used to transfer data.

Key:

1. Answer: b 2. Answer: b 3. Answer: a 4. Answer: c 5. Answer: d 6. Answer: a 7. Answer: b 8. Answer: a 9. Answer: c 10. Answer: c

Difficulty: Easy Difficulty: Medium Difficulty: Medium Difficulty: Medium Difficulty: Medium Difficulty: Hard Difficulty: Medium Difficulty: Hard Difficulty: Medium Difficulty: Medium

Reference: p. 12 Reference: p. 14 Reference: p. 16 Reference: p. 22 Reference: pp. 1617 Reference: p. 11 Reference: p. 27 Reference: p. 13 Reference: pp. 22 Reference: p. 21

Quiz 2 , chapt-2 1) Which of the following is an example of a cross-functional business process? A) identifying customers B) creating a new product C) assembling a product D) paying creditors

2) The term "management information systems" designates a specific category of information systems serving: A) integrated data processing throughout the firm. B) transaction process reporting. C) employees with online access to historical records. D) middle management functions.

3) Decision-support systems are often referred to as business ________ systems. A) information B) intelligence C) analysis D) modeling

4) ESS are specifically designed to serve which level of the organization? A) operational B) end-user C) middle management D) senior management

5) Which systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A) transaction processing systems B) executive support systems C) management information systems

D) decision-support systems

6) The four major enterprise applications are A) SCMs, CRMs, DSSs, and KMSs. B) SCMs, CRMs, ESSs, and KMSs. C) enterprise systems, SCMs, DSSs, and CRMs. D) enterprise systems, SCMs, CRMs, and KMSs.

7) Enabling management to make better decisions regarding organizing and scheduling sourcing, production, and distribution is a central feature of A) SCMs B) TPSs C) KMSs D) ERPs

8) ________ uses a set of integrated applications to address all aspects of the customer relationship. A) CRM B) MIS C) CLE D) CLU

9) The advantage of a having a centralized information services department that operates as a separate department similar to other departments is that

A) this is more likely to produce more compatible systems and more coherent long-term systems development plans. B) this lowers costs of technology purchases. C) systems are built that directly address that function's business needs. D) systems are built that can function independently and more efficiently.

10) Which of the following types of organizing the information systems function would you be most likely to find in a small company with 20 employees? A) as departments within each functional area B) as a separate, centralized department C) represented within each major division of the company D) none of the above

Key:

1. Answer: B 2. Answer: D 3. Answer: B 4. Answer: D 5. Answer: B 6. Answer: D 7. Answer: A

Diff: 2 Diff: 1 Diff: 2 Diff: 1 Diff: 2 Diff: 1 Diff: 2

Page Ref: 43 Page Ref: 47-48 Page Ref: 49 Page Ref: 51 Page Ref: 51 Page Ref: 54 Page Ref: 56

8. Answer: A 9. Answer: A 10. Answer: D

Diff: 1 Diff: 3 Diff: 2

Page Ref: 57 Page Ref: 64 Page Ref: 64-66

1) Which of the following would NOT be considered a disruptive technology? A) instant messaging B) e-mail C) Internet telephony D) PCs

2) Business processes are collections of A) informal practices and behaviors. B) formalized and documented practices. C) routines. D) rights and privileges.

3) The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability to compete. A) network economics B) competitive forces C) competitive advantage D) demand control

4) The four major types of competitive strategy are A) low-cost leadership; substitute products and services; customers; and suppliers. B) low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy. C) new market entrants; substitute products and services; customers; and suppliers. D) low-cost leadership; new market entrants; product differentiation; and focus on market niche.

5) When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a ________ strategy. A) product differentiation B) market niche C) mass customization D) process efficiency

6) Internet technology A) makes it easy for rivals to compete on price alone. B) imposes a significant cost of entry, due to infrastructure requirements. C) increases the difference between competitors because of the wide availability of information. D) makes it easy to sustain operational advantages.

7) The value chain model A) categorizes five related advantages for adding value to a firm's products or services. B) sees the supply chain as the primary activity for adding value. C) categorizes four basic strategies a firm can use to enhance its value chain.

D) helps a firm identify points at which information technology can most effectively enhance its competitive position.

8) The secondary activities of a firm include A) inbound logistics, technology, outbound logistics, sales and marketing, and service. B) inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. C) organization infrastructure, human resources, sales and marketing, and technology. D) organization infrastructure, human resources, technology, and procurement.

9) How are information systems used at the industry level to achieve strategic advantage? A) by building industry-wide, IT-supported consortia and symposia B) by raising the bargaining power of suppliers C) by encouraging the entry of new competitors D) by enforcing standards that reduce the differences between competitors

10) In network economics, the value of a commercial software vendor's software products A) increases as more people use them. B) decreases as more people use them. C) increases due to higher marginal gain in output. D) decreases according to the law of diminishing returns.

Key:

1. Answer: A 2. Answer: C 3. Answer: B 4. Answer: B 5. Answer: B 6. Answer: A 7. Answer: D 8. Answer: D 9. Answer: A 10. Answer: A

Diff: Hard Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Easy Diff: Medium Diff: Easy Diff: Easy

Page Ref: 84-85 Page Ref: 82 Page Ref: 92 Page Ref: 96 Page Ref: 98 Page Ref: 101 Page Ref: 102 Page Ref: 102 Page Ref: 104 Page Ref: 106

Quiz 4 (Chapter 4) 2010

1) The introduction of new information technology has a

A) dampening effect on the discourse of business ethics. B) ripple effect raising new ethical, social, and political issues. C) beneficial effect for society as a whole, while raising dilemmas for consumers. D) waterfall effect in raising ever more complex ethical issues.

2) Advances in data storage techniques and rapidly declining storage costs have

A) been accompanied by relevant federal statutes protecting personal data. B) made universal access possible. C) doubled every 18 months. D) made routine violations of privacy cheap and effective.

3) The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called

A) due process. B) accountability. C) the courts of appeal. D) the judicial system.

4) The Federal Trade Commission FIP principle of Notice/Awareness states that

A) customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B) data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

C) there is a mechanism in place to enforce FIP principles. D) Web sites must disclose their information practices before collecting data.

5) When a cookie is created during a Web site visit, it is stored

A) on the Web site computer. B) on the visitor's computer. C) on the ISP's computer. D) in a Web directory.

6) A(n) ________ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.

A) opt-in B) opt-out C) P3P D) PGP

7) The P3P standard is concerned with

A) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information. B) allowing users to surf the Web anonymously. C) scrambling data so that it can't be read. D) blocking or limiting cookies.

8) Intellectual property can best be described as

A) intangible property created by individuals or corporations. B) unique creative work or ideas. C) tangible or intangible property created from a unique idea. D) the expression of an intangible idea.

9) Which of the five moral dimensions of the information age does spamming raise?

A) quality of life B) system quality C) accountability and control D) information rights and obligations

10) The term "________ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.

A) computer B) technology C) digital D) electronic

Key:

1. Answer: B 2. Answer: D 3. Answer: B 4. Answer: D 5. Answer: B 6. Answer: B 7. Answer: D 8. Answer: A 9. Answer: A 10. Answer: C

Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Medium Diff: Hard Diff: Medium Diff: Easy

Page Ref: 124 Page Ref: 126 Page Ref: 129 Page Ref: 133 Page Ref: 134 Page Ref: 136 Page Ref: 137 Page Ref: 138 Page Ref: 146 Page Ref: 147

You might also like