You are on page 1of 10


These systems employ the most advanced graphics software and can present graphs and data
from many sources.
a) decision-support systems.
b) transaction processing systems.
c) management information systems.
d) executive information systems.
e) Office Automation System

2. When the output of some units can be used as inputs to other units, or if two organizations
pool markets and expertise that result in lower costs and generate profits it is often referred to
as creating.
a) switching costs.
b) synergies.
c) low-cost producer strategies.
d) digital strategies.
e) competitive advantages

3. These systems are especially suited to situations in which the procedure for arriving at a
solution may not be fully predefined in advance.
a) knowledge management systems.
b) decision-support systems.
c) transaction processing systems.
d) management information systems.
e) Supply chain management

4. Engineers or architects who design products or services are called.

a) service workers.
b) data workers.
c) information specialists.
d) knowledge workers.
e) System architect

5. The greatest difficulty of bringing about organizational change - especially the development of
new information systems -is.
a) computerizing manual systems.
b) political resistance.
c) recruiting qualified employees.
d) perceiving environmental change.
e) none of the above

6. When a large firm uses an extranet to link to its suppliers and other key business partners, a(n)
________ is created.
a) web marketplace
b) channels center
c) private industrial network
d) intranet
e) None of the above
7. Investments in new business processes, management behavior, or training to enhance returns
on information technology investments are called ______________________
a) social capital
b) business investments
c) organizational and management capital
d) organizational investments
e) None of the above

8. The use of the Internet and digital technology to execute all of the activities in the enterprise is
referred to as: _______
a) electronic business.
b) digital processes.
c) digital business.
d) electronic commerce.
e) electronic process

9. Which of the following would not be classified as a management activity in the business
information value chain? _______
a) disseminating
b) controlling
c) coordinating
d) planning
e) all of the above

10. The application of the Internet and related technologies to digitally enable government and
public sector agencies' relationships with citizens, businesses, and other arms of government is
called: _______
a) e-government.
b) e-commerce.
c) e-technology.
d) e-business.
e) none of the above

11. These systems allow users to change assumptions, ask new questions, and include new data:
a) executive information systems.
b) decision-support systems.
c) management information systems.
d) transaction processing systems.
e) none of the above

12. A broad-based understanding of information systems that includes behavioral knowledge

about organizations and individuals using information systems as well as technical knowledge
about computers is called: ______
a) management literacy.
b) information systems literacy.
c) technology literacy.
d) computer literacy.
e) none of the above

13. Compensation analysis and training and development are examples of: ______
a) human resources information systems.
b) sales and marketing information systems.
c) finance and accounting information systems.
d) enterprise application information systems.
e) none of the above

14. A (an) ________ collects data from various key business processes and stores the data in a
single comprehensive data repository, usable by other parts of the business. ______
a) automatic reporting system
b) management information system
c) transaction system
d) enterprise system
e) none of the above

15. ________ are designed to support organization-wide process coordination and integration.
a) enterprise applications
b) strategic planning operations
c) decision-support systems
d) management information systems
e) none of the above

16. CAD, machine control, and facilities location are examples of: ______
a) enterprise application information systems.
b) sales and marketing information systems.
c) manufacturing and production information systems.
d) finance and accounting information systems.
e) none of the above

17. Collections of routines for producing goods and services are referred to as: ______
a) mediating factors.
b) work with routine tasks.
c) standard reporting procedures.
d) business processes.
e) none of the above

18. Information systems managers are:__________________

a) specialists who translate business problems and requirements into information requirements
and systems.
b) leaders of the various specialists in the information system department.
c) in change of the information systems function in the organization.
d) highly-trained technical specialists who write computer software instructions.
e) none of the above

19. The greatest difficulty of bringing about organizational changeespecially the development
of new information systemsis: ______
a) recruiting qualified employees.
b) perceiving environmental change.
c) computerizing manual systems.
d) political resistance.
e) none of the above

20. According to the ________ model of human behavior, an individual identifies goals, ranks all
possible alternatives actions by their contributions to those goals, and chooses the alternative
that contributes most to those goals. ______
a) decisional model
b) choice model
c) rational model
d) hierarchical
e) none of the above

21. The ________ model is used to describe the interaction of external influences, specifically
threats and opportunities that affect an organization's strategy and ability to compete. ______
a) strategic transitions
b) environmental conditions
c) network economics
d) competitive forces
e) none of the above

22. Companies are realizing substantial cost savings from: ______

a) up-to-date competitive analyses.
b) web-based customer self-service applications.
c) customer communities.
d) online storefronts.
e) none of the above

23. Pure-play business models are businesses that: ______

a) are an example of business-to-business electronic commerce.
b) are extensions of traditional bricks-and-mortar businesses.
c) do not sell a physical product.
d) did not have an earlier existing bricks-and-mortar business before they went to the internet.
e) none of the above

24. Net marketplaces are: ______

a) owned by one central provider, which facilitates transfer of information.
b) more transaction oriented and less relationship oriented than private industrial networks.
c) more relationship oriented and less transaction oriented than private industrial networks.
d) useful for determining fixed prices for goods.
e) none of the above

25. The driving force behind the explosion of electronic business and the emergence of the digital
firm is: ______
a) new business models.
b) the low-cost connectivity and universal standards provided by internet technology.
c) TCP/IP.
d) the emergence of a worldwide global economy, which cannot be affected by politics.
e) none of the above

26. Which of the following is stress induced by computer use, and its symptoms include
aggravation, hostility toward humans, impatience, and enervation? ______
a) technostress
b) carpal tunnel syndrome
c) computer stress
d) techno aggravation
e) none of the above

27. Accepting the potential costs, duties, and obligations for the decisions you make is referred to
a) due process.
b) liability.
c) responsibility.
d) accountability.
e) none of the above

28. The P3P standard is concerned with: ______

a) scrambling data so that it can't be read.
b) blocking or limiting cookies.
c) allowing users to surf the web without being identified.
d) controlling pop-up ads based on user profiles and preventing ads from collecting or sending
e) none of the above

29. Which software company would not be classified as one of the largest providers of enterprise
application software? ______
a) Peoplesoft
b) Macromedia
c) SAP
d) Oracle
e) none of the above

30. Which of the following refers to the ability of a computer, product, or system to expand to
serve a larger number of users without breaking down? ______
a) scalability
b) expandability
c) disintermediation
d) modifiability
e) none of the above

31. Unix and Linux constitute the backbone of corporate infrastructure throughout much of the
world. Which one of the following options does not apply to this statement? ______
a) they are scalable.
b) they are more expensive than mainframe operating systems.
c) they are reliable.
d) they are less expensive than mainframe operating systems.
e) none of the above

32. The formal language programmers use to specify the content and structure of the database is
the: ______
a) structured query language.
b) data dictionary language.
c) data definition language.
d) data manipulation language.
e) none of the above

33. The confusion created by ________ makes it difficult for companies to create customer
relationship management, supply chain management, or enterprise systems that integrate
data from different sources. ______
a) online processing
b) data redundancy
c) batch processing
d) data independence
e) none of the above

34. The select operation: ______

a) creates a subset consisting of all records in the file that meets stated criteria.
b) combines relational tables to provide the user with more information than is otherwise available.
c) identifies the table from which the columns will be selected.
d) creates a subset consisting of columns in a table.
e) none of the above

35. The main technique for multidimensional reporting is: _____

a) data mining.
b) SQL.
c) multiple relationships in large quantities of data.
d) OLAP.
e) none of the above

36. The part of a network that handles the major traffic is: _____
a) backbone.
b) multiplexer.
c) front end.
d) network interface.
e) none of the above
37. In the Domain Name System, the domain immediately below the root domain is the: _____
a) state domain.
b) final destination.
c) top-level domain.
d) IP address.
e) none of the above

38. The total amount of digital information that can be transmitted through any
telecommunications medium is measured in: _____
a) baud.
b) gigaflops.
c) hertz.
d) bps.
e) none of the above

39. Internet security challenges for the server during communication include: _____
a) tapping, sniffing, message alteration.
b) copying of data, alteration of data, loss of machine.
c) theft and fraud.
d) computer viruses, line taps, hacking.
e) none of the above

40. Mirroring: _____

a) distributes large numbers of access requests across multiple servers.
b) uses a backup server that duplicates all the processes and transactions of the primary server.
c) links two computers together so the second can be a backup to the first.
d) both a and c
e) none of the above

41. Virtual reality systems: _____

a) provide engineers, designers, and factory managers with precise control over industrial design
and manufacturing.
b) provide an important source of expertise for organizations.
c) provide drug designers, architects, engineers, and medical workers with precise, photorealistic
simulations of objects.
d) allow groups to work together on documents.
e) none of the above

42. Knowledge that resides in the minds of employees that has not been documented is called:
a) tacit knowledge.
b) standard operating procedures.
c) corporate culture.
d) organizational memory.
e) none of the above

43. To automate routine tasks to help firms search for and filter information for use in electronic
commerce and supply chain management a firm would most likely use: _____
a) intelligent agents.
b) virtual reality systems.
c) fuzzy logic systems.
d) CAD systems.
e) none of the above

44. Tools for voting or setting priorities in a GDSS: _____

a) facilitate the organized integration and synthesis of ideas generated during brainstorming.
b) make available a range of methods for setting priorities.
c) document group agreement on definitions of words and terms central to the projects.
d) use structured approaches to evaluate the impact of an emerging proposal on the organization.
e) none of the above

45. The use of computers to combine data from multiple sources and creating electronic dossiers
of detailed information on individuals is called: _____
a) safe harbor.
b) invasion.
c) spamming.
d) profiling.
e) none of the above

46. New technologies can be used to: _____

a) achieve social progress.
b) threaten social values.
c) commit crimes.
d) all of the above.
e) none of the above

47. Using numerous computers to inundate and overwhelm the network from numerous launch points is
called a: _____
a) cybervandalism.
b) worm
c) trojan horse.
d) DDoS.
e) none of the above
48. The more any given resource is applied to production, the lower the marginal gain in output,
until a point is reached where the additional inputs produce no additional output is referred
to as:_____
a) inelasticity.
b) the law of diminishing returns.
c) supply and demand.
d) the point of no return.
e) none of the above

49. Which of the following are types of intelligent techniques?

a) virtual reality
b) case based reasoning
c) knowledge networks
d) computer-aided design
e) none of the above

50. Sets of operating instructions that direct and control computer processing are called: _____
a) protocols
b) computer programs
c) policies
d) procedures
e) none of the above

51. ________ are common features of all organizations.

a) formal structure, function, and environments
b) power, technology, and business processes
c) formal structure, politics, and goals
d) culture, routines, and politics
e) none of the above