You are on page 1of 12

_____ is the process by which organizational goals are achieved through the use of

organizational resources.
management
Which of the following is not a basic role of managers?
processor
Being a figurehead and leader is part of the _____ managerial role.
interpersonal
Being an entrepreneur, disturbance handler, and negotiator is part of the _____
managerial role.
dicisional
In the _____ phase of the decision-making process, managers examine a situation and
identify and define the problem.
intelligence
In the _____ phase of the decision-making process, managers construct a model that
simplifies the problem.
design
Success in the _____ phase of the decision-making process results in resolving the
original problem, and failure leads to a return to previous phases.
implementation
In the _____ phase of the decision-making process, managers test potential solutions
"on paper."
choice
Which of the following is not a reason why managers need IT support?
The number of alternatives is decreasing
Decisions today are becoming _____ complex, due to _____ uncertainty in the decision
environment.
more, increased
Which of the following is not a characteristic of a structured decision?
he first three phases of the decision-making process need not occur in any particular
sequence
The type of decision that can be made by following a definite procedure is called a(n)
______ decision.
structured
Upgrade to remove ads
Only $2.99/month
Which of the following is not a characteristic of unstructured decisions?
standard solutions exist.
When there is no well-understood or agreed-on procedure for making a decision, the
decision is said to be:
unstructured
Which type of decision requires a combination of standard solution procedures and
individual judgment?
semistructured
_____ is the efficient and effective execution of specific tasks.
operational control
_____ is the acquisition and efficient use of resources in accomplishing organizational
goals.
management control
Computer support is greatest for which of the following problems?
structured and operational control
Searching for valuable business information in a database, data warehouse, or data
mart is referred to as _____.
data mining
. _____ provides users with a view of what is happening, whereas _____ addresses
why it is happening.
multidimensional data analysis, data mining
Which of the following is not a characteristic of decision support systems?
they support only lower- and middle-level managers.
_____ attempts to find the value of the inputs necessary to achieve a desired level of
output.
goal-seeking analysis
A(n) _____ provides rapid access to timely information and direct access to
management reports.
digital dashboard
Which capability of digital dashboards enables users to obtain the latest data available
on key performance indicators or some other metric, ideally in real time?
status access
Digital dashboards provide all of the following capabilities except:
transaction processing
The primary distinguishing characteristic of geographical information systems is:
every record or digital object has an identified geographical location
Geocoding involves:
integrating maps with spatially oriented databases and other databases
Business intelligence is:
a tool for both gathering and analyzing data and decision making.
Monitor, disseminator, spokesperson, and analyzer are examples of the _________ role
of a manager.
informational
Which of the following programs includes online analytical processing (OLAP)?
excel
Which of the following statements regarding data visualization is true?
they make applications more available and attractive to users.
An example of a key performance indicator is:
return on investment.
Upgrade to remove ads
Only $2.99/month
Which of the following is not a true statement regarding decision making?
all of the decision makers must be located in the same location.
_____ are computer-based information systems that combine models and data in an
attempt to solve semistructured and some unstructured problems with extensive user
involvement.
decision support systems
_____ is the study of the impact that changes in one or more variables of a decision-
making model have on other variables.
sensitivity analysis
_____ is the study of the impact of a change in the assumptions (input data) on the
proposed solution.
what-if analysis
This information system uses data visualization technologies to analyze and display
data in the form of digital maps for planning and decision making purposes.
geographical information system
Which capability of digital dashboards enables users to go into greater detail?
drill down
Which capability of digital dashboards enables users to have reports that highlight
deviations larger than certain threshholds.
exception reporting
What type of data visualization technique allows analysts to extract information from the
usage patterns of mobile devices?

A_____ is intellectual work that is known only to a company and is not based on public
information
a) copyright
b) patent
c) trade secret
d) knowledge base
e) private property
C
Which of the following is not an ethical issue?
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
C
_____ issues involve collecting, storing and disseminating information about individuals
a) privacy
b) accuracy
c) transferability
d) property
e) accessibility
A
Which of the following factors are increasing the threats to information security?
a) smaller computing devices
b) cheaper computing devices
c) the Internet
d) increased computer literacy
e) all of the above
E
� A(n) _____ is the harm, loss, or damage that can result if an information resource is
compromised
a) vulnerability
b) risk
c) control
d) threat
e) exposure
E
Which of the following is not an unintentional threat to information systems?
a) human errors
b) viruses
c) environmental hazards
d) computer system failures
e) none of the above
b
_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges
a) cracking
b) hacking
c) spoofing
d) social engineering
e) spamming
d
The fastest growing white collar crime is _____
a) extortion
b) identity theft
c) insider trading
d) stock fraud
e) software piracy
b
_____ is/are usually a password that allows an attacker to bypass any security
procedures
a) viruses
b) worms
c) Trojan horses
d) back doors
e) alien software
d
In _____, the organization takes concrete actions against risks
a) risk management
b) risk analysis
c) risk mitigation
d) risk acceptance
e) risk transference
c
________ allow US companies to comply with European Union laws regarding the
protection of personal data?
a) European Privacy Act
b) Safe Harbor Principles
c) Euro-US Trade Agreement
d) All of the above
b
In this type of e-commerce, the sellers are organizations and the buyers are individuals.

A
government-to-citizen
B.
consumer-to-consumer
C.
business-to-business
D.
business-to-consumer
E.
none of the above
d
Upgrade to remove ads
Only $2.99/month
In which of the following business models do customers specify a need and an
intermediary compares providers and shows the lowest price?
A.
find-the-best-price
B.
electronic tendering system
C.
name-your-own-price
D.
online direct marketing
E.
affiliate marketing
c
Which of the following is not an advantage of the online job market?
A.
low cost
B.
recruiting company guaranteed the best applicant for the job
C.
ease of transmitting information and documents
D.
recruiting company saves time on data entry by using electronic forms
E.
none of the above
b
Internet fraud is:
A.
increasing slowly
B.
decreasing rapidly
C.
increasing rapidly
D.
decreasing slowly
E.
staying about the same
c
Electronic commerce is a broader term than electronic business.
A. True
B. False
b
In pure electronic commerce, the product or service, the process, and the delivery agent
are digital.
A. True
B. False
b
eBay is a good example of pure electronic commerce.
A. True
B. False
a
Companies that are engaged only in electronic commerce are considered click-and-
mortar organizations.
A. True
B. False
b
With business-to-consumer EC, the sellers and buyers are organizations.
A. True
B. False
b
Internet ads reach only local markets, which is an advantage over traditional ads.
A. True
B. False
b
In a forward auction, a single seller auctions item(s) to many potential buyers.
A. True
B. False
a
Upgrade to remove ads
Only $2.99/month
The vast majority of electronic commerce volume is business-to-business.
A. True
B. False
b
Even though the Internet works well for job seekers and companies trying to hire new
people, the costs are higher than with traditional "help wanted" ads.
A. True
B. False
b
The computing skills necessary to be a hacker are increasing.
True
False
b
Unintentional threats to information systems include all of the following except:
malicious software
power outage
lack of user experience
tornados
a
___________ restrict unauthorized individuals from using information resources and are
concerned with user identification.
Administrative controls
Physical controls
Access controls
Communication controls
c
IT security is the responsibility of everyone in the organization.
True
False
a
_____ involves building an inappropriate trust relationship with employees for the
purpose of gaining sensitive information or unauthorized access privileges.
Tailgating
Hacking
Phishing
Social engineering
Spamming
d
Which of the following is not a strategy for mitigating the risk of threats against
information?
Continue operating with no controls and absorb any damages that occur
Transfer the risk by purchasing insurance
Implement controls that minimize the impact of the threat
Install controls that block the risk
All of the above are strategies for mitigating risk
e
In _____, the organization purchases insurance as a means to compensate for any
loss.
risk management
risk analysis
risk acceptance
risk transference
d
Biometrics are an example of:
something the user is.
something the user wants.
something the user has.
something the user knows.
something the user does.
a
Upgrade to remove ads
Only $2.99/month
Having one backup of your business data is sufficient for security purposes.
True
False
b
In a process called _____, a company allows nothing to run unless it is approved,
whereas in a process called _____, the company allows everything to run unless it is
not approved.
whitelisting, encryption
whitelisting, blacklisting
encryption, whitelisting
encryption, blacklisting
blacklisting, whitelisting
b
The right of privacy is absolute.
True
False
b
Various organizations that promote fair and responsible use of information systems
often develop a _____.
Code of ethics
Strategic plan
Mission statement
Responsibility charter
Goals outline
a
_____ issues involve the authenticity and fidelity of information that is collected and
processed.
Privacy
Accuracy
Transferability
Property
Accessibility
b
______________ is a legal concept that gives individuals the right to recover the
damages done to them by other individuals, organizations, or systems.
Privacy
Responsibility
Transferability
Accountability
Liability
e
When you interview for a job at a company, it is likely that the company will Google you
and search social networking sites for information on you.
True
False
a
Which of the following statements is correct?
An individual's right to privacy is absolute.
An individual's right to privacy supersedes the needs of society.
Determining and enforcing privacy regulations can be difficult.
Advances in information technologies have not affected individual privacy.
The Internet has increased individuals' privacy.
c
Which of the following statements is not correct?
Employees have limited protection against surveillance by employers.
The large majority of organizations monitor employee Internet usage.
The large majority of organizations use URL filtering.
As with normal first-class mail, federal laws state that employers cannot read employee
e-mail.
d
An individual or organization faced with an ethical decision is basically considering
whether to break the law.
True
False
b
Upgrade to remove ads
Only $2.99/month
Electronic commerce provides opportunities for companies to do all of the following
except:
expand their reach
expand at relatively high cost
put rich information on their Web sites
increase market share
b
E-commerce affects only businesses that sell products online.
True
False
b
In this type of e-commerce, the sellers and buyers are organizations.
consumer to consumer
business to consumer
consumer to business
business to business
d
_____ auctions are the most common auction model for large purchases.
Forward
Static
Reverse
c
_____ refers to the practice of registering or using domain names for the purpose of
profiting from the goodwill or trademark belonging to someone else.
Domain spoofing
Cybersquatting
Domain fraud
None of the above
b
Channel conflict occurs when click-and-mortar companies have problems with their
regular distributors when they sell directly to customers online.
True
False
a
If you are an worker managing your fringe benefits over your company's intranet, you
are engaging in _________ e-commerce.
business-to-business
business-to-consumer
consumer-to-consumer
business-to-employee
e-government
d
The advantages of electronic commerce for consumers include all of the following
except:
You can buy from home 24 hours per day, 7 days per week.
You have a wider variety of products to choose from.
You typically cannot access additional information, so you do not have information
overload.
You can easily compare prices and features.
You can find unique items.
c
________ is the process whereby a fully automated electronic commerce transaction
eliminates middlemen.
Disintegration
Supply chain integration
Direct sales
Disintermediation
Value-added services
d
In the _____ marketplace model, EC technology is used to streamline the purchasing
process in order to reduce the cost of items purchased, the administrative cost of
procurement, and the purchasing cycle time.
buy-side
sell-side
auctions
group purchasing
electronic exchange
a
Upgrade to remove ads
Only $2.99/month
Which of the following statements concerning Web 2.0 sites is false?
They harness collective intelligence.
They deliver functionality as services.
They feature remixable applications and data.
They encourage user participation.
They cannot be used to start a business.
e
A wiki is a collection of blogs.
True
False
b
Which of the following is not an example of Web 2.0 applications?
Blogs
Social Networks
Wikis
Crowdsourcing
b
You can always trust the content of Web 2.0 sites.
True
False
b
You just started to work on a project with three other people. You realize that everyone
has their own notes, which makes it hard for you to keep track of what has been done
and what still needs to be done. Which of the following applications would you suggest
the team use?
A blog
A netcasts
A wiki
A mashup
c
LinkedIn is a _______________________ social networking site that makes money
from advertising and services.
Business-oriented
Training
College
Video-upload
Blogging

a. Has a way of fouling up people's lives, especially when the party with the inaccurate information
has an advantage in power and authority.

You might also like