You are on page 1of 11

Chapter 1 Information Systems in Global Business Today

Which of the following may lead to competitive advantage?


1. New products, services, and business models;
2. Charging less for superior products;
3. Responding to customers in real time
A) 1 only; B) 1 and 2; C) 2 and 3; D) 1 and 3; E) 1, 2, and 3

Which of the following statements about digital firms is not true?


A) In digital firms, time shifting and space shifting are the norm.
B) Today, most firms are fully digital.
C) Digital firms offer extraordinary opportunities for flexible global organization and
management.
D) Digital firms sense and respond to their environments more rapidly than traditional firms.
E) Digital firms have more flexibility to survive in turbulent times.

Which of the following statements about digital firms is not true?


A) In digital firms, time shifting and space shifting are the norm.
B) Today, most firms are fully digital.
C) Digital firms offer extraordinary opportunities for flexible global organization and
management.
D) Digital firms sense and respond to their environments more rapidly than traditional firms.
E) Digital firms have more flexibility to survive in turbulent times.

Data management technology consists of which of the following?


A) Physical hardware and media used by an organization for storing data
B) Detailed, preprogrammed instructions that control and coordinate the computer hardware
components in an information system
C) Two or more computers to share data or resources
D) Hardware and software used to transfer data
E) Software governing the organization of data on physical storage media

All of the following are examples of environmental actors in an information system except:
A) competitors; B) regulatory agencies; C) customers; D) suppliers; E) sales force.

Disciplines that contribute to the technical approach to information systems include:


A) computer science, engineering, and networking.
B) operations research, management science, and computer science.
C) engineering, utilization management, and computer science.
D) management science, computer science, and engineering.
E) economics, sociology, and psychology.
Which of the following would be used as an input for an information system?
A) Sales by region report; B) Sales for stores in a region; C) Product ID, and price;
D) Year to date sales of products; E) Marketing costs report for each product

In ________, raw data is systematically acquired and transformed during various stages
that add value to that information.
A) an information value chain; B) the firm value chain; C) information processing;
D) the feedback process; E) the dissemination process
Chapter 2 Global E-business and Collaboration

You have been hired by a non-profit organization to implement a system to handle


donations. The system must be able to handle and record telephone, text, and Internet
donations, provide up-to-the-minute reports, and create highly customizable mailing lists.
In addition, event fundraisers need to be able to quickly access a donor's information and
history. Which of the following systems will best meet these needs?
A) TPS; B) TPS with DSS capabilities; C) TPS with MIS capabilities;
D) TPS with ESS capabilities; E) DSS with MIS capabilities

The term management information systems refers to a specific category of information


systems serving:
A) integrated data processing throughout the firm; B) transaction process reporting;
C) employees with online access to historical records; D) the information technology function;
E) middle management functions

All of the following are examples of business intelligence systems except a system that:
A) summarizes and reports on a company's basic operations.
B) tracks the flows of materials in a factory.
C) focuses on problems that are unique and rapidly changing.
D) compares total annual sales figures for specific products to planned targets.
E) addresses nonroutine decisions.

What is the most important function of an enterprise application?


A) Increasing speed of communicating
B) Enabling business functions and departments to share information
C) Enabling a company to work collaboratively with customers and suppliers
D) Enabling cost-effective e-business processes
E) Enabling inventory and supply chain management

The four major types of enterprise applications are:


A) SCM, CRM, DSS, and KMS; B) SCM, CRM, ESS, and KMSs;
C) ERP, SCM, DSS, and CRM; D) ERP, SCM, CRM, and KMS.; E) TPS, MIS, DSS, and ESS.

All of the following are capabilities of enterprise social networking tools except:
A) the ability to set up member profiles; B) the ability to share, store, and manage content;
C) the ability to establish groups and team workspaces; D) tagging and social bookmarking.
E) supply chain management
Which of the following is not a business benefit of collaboration?
A) Improved quality; B) Improved financial performance; C) Improved customer service;
D) Improved innovation; E) Improved compliance with government regulations

All of the following are reasons for the increased business focus on collaboration and
teamwork, except for:
A) the need for creating innovative products and services;
B) growth of "interaction" jobs; C) greater global presence;
D) the need for more efficient work hierarchies; E) the need to reduce communication costs.

Which of the following tools would you use to evaluate and choose a collaboration tool for
your organization?
A) Virtual meeting system; B) Cloud collaboration; C) IBM Notes
D) The collaboration matrix; E) The time/space collaboration and social tool matrix
Chapter 3 Information Systems, Organizations, and Strategy

The interaction between information technology and organizations is influenced:


A) solely by the decision making of middle and senior managers.
B) by the development of new information technologies.
C) by many factors, including structure, politics, culture, and environment.
D) by two main macroeconomic forces: capital and labor.
E) by the rate of growth of the organization.

Which of the following is not a major feature of organizations that impacts the use of
information systems?
A) Business processes; B) Environments; C) Structure of the organization
D) Agency costs; E) Leadership styles

Which of the following statements about disruptive technologies is not true?


A) Disruptive technologies radically change the business landscape and environment.
B) Disruptive technologies may be substitute products that perform better than other products
currently being produced.
C) Disruptive technologies may sometimes simply extend the marketplace.
D) Disruptive technologies may put entire industries out of business.
E) Firms that invent disruptive technologies as first movers always become market leaders.

According to research on organizational resistance, the four components that must be


changed in an organization in order to successfully implement a new information system
are:
A) environment, organization, structure, and tasks.
B) technology, people, culture, and structure.
C) organization, culture, management, and environment.
D) tasks, technology, people, and structure.
E) costs, tasks, structure, and management.

Which model is used to describe the interaction of external forces that affect an
organization's strategy and ability to compete?
A) Network economics model
B) Competitive forces model
C) Competitive advantage model
D) Demand control model
E) Agency costs model
All of the following are competitive forces in Porter's model except:
A) suppliers; B) new market entrants; C) disruptive technologies.
D) customers; E) substitute products.

Amazon's use of the Internet as a platform to sell books more efficiently than traditional
bookstores illustrates which of the following strategies?
A) Low-cost leadership; B) Marketing effectiveness; C) Focusing on market niche
D) Strengthening supplier intimacy; E) Developing synergies

The four major competitive strategies are:


A) low-cost leadership, substitute products and services, customers; and suppliers.
B) low-cost leadership, product differentiation, focus on market niche, and customer and supplier
intimacy.
C) new market entrants, substitute products and services, customers, and suppliers.
D) low-cost leadership, new market entrants, product differentiation, and focus on market niche.
E) customers, suppliers, new market entrants, and substitute products.

The ability to offer individually tailored products or services using the same production
resources as bulk production is known as:
A) mass marketing; B) micromarketing; C) micro customization; D) niche customization.
E) mass customization

The value chain model:


A) categorizes five related advantages for adding value to a firm's products or services.
B) sees the supply chain as the primary activity for adding value.
C) categorizes four basic strategies a firm can use to enhance its value chain.
D) highlights specific activities in the business where competitive strategies can best be applied.
E) enables more effective product differentiation.

Information systems enhance core competencies by:


A) providing better reporting facilities; B) creating educational opportunities for management.
C) allowing operational employees to interact with management.
D) encouraging the sharing of knowledge across business units.
E) fostering synergies among departments.

Which of the following is a support activity in a firm's value chain?


A) Inbound logistics; B) Operations; C) Sales and marketing; D) Service; E) Technology
Chapter 4 Ethical and Social Issues in Information Systems

Which of the following is not one of the current key technology trends that raises ethical
issues?
A) Data storage improvements
B) Data analysis advancements
C) Increase in data quality
D) Increase in use of mobile devices
E) Advances in networking technology

All of the following are steps in the process for analyzing an ethical issue except:
A) assigning responsibility.
B) identifying the stakeholders.
C) identifying the options you can reasonably take.
D) identifying and clearly describing the facts.
E) identifying the potential consequences of your options.

When a cookie is created during a website visit, it is stored:


A) on the website's server.
B) on the hard drive of the visitor's computer.
C) on the ISP's servers.
D) in the browser's application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the
website.

All of the following are technical solutions to protecting user privacy except:
A) email encryption.
B) anonymous surfing.
C) anonymous email.
D) preventing client computers from accepting cookies.
E) data use policies.

Which of the following statements about cookies is not true?


A) Cookies are installed only at the user's request.
B) Cookies are stored on the user's computer.
C) Cookies cannot be easily detected or deleted.
D) Cookies are used to support the user experience on websites.
E) Cookies can be combined with other website data to develop detailed profiles of customers.
Chapter 5 IT Infrastructure and Emerging Technologies
IT infrastructure includes investment in hardware, software, and services—such as consulting, education, and training
Which of the following is not an IT infrastructure service component?
A) Operating system software
B) Computing platforms to provide a coherent digital environment
C) Physical facilities management to manage the facilities housing physical components
D) IT management services to plan and develop the infrastructure and provide project
management
E) IT education services that provide training to employees

Place the following eras of IT infrastructure evolution in order, from earliest to most
recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal
Computer; and 5. Mainframe and Minicomputer.
A) 5, 2, 3, 4, 1
B) 5, 4, 2, 3, 1 Components of I T Infrastructure?
1.Computer hardware platforms
C) 4, 5, 2, 3, 1 2.Operating system platforms
3.Enterprise software applications
D) 5, 4, 2, 1, 3 4.Data management and storage
E) 4, 5, 3, 2, 1 5.Networking/telecommunications
platforms
6.Internet platforms
7.Consulting system integration services
In a multi-tiered network:
A) the work of the entire network is centralized.
B) the work of the entire network is balanced over several levels of servers.
C) processing is split between clients and servers.
D) processing is handled by multiple, geographically-remote clients. 是提供消費者處理理、儲存、網路路以及各種基礎運算資源,以部署與執⾏行行作
業系統或應⽤用程式等各種軟體。是雲服務的最底層,主要提供⼀一些基礎資
E) processing is located in the cloud. 源。它與 PaaS 的區別是,⽤用⼾戶需要⾃自⼰己控制底層,實現基礎設施的使⽤用
邏輯。 客⼾戶端無須購買伺服器、軟體等網路路設備,即可任意部署和運⾏行行
處理理、存儲、網絡和其它基本的計算資源,不能控管或控制底層的基礎設
施,但是可以控制作業系統、儲存裝置、已部署的應⽤用程式,有時也可以
有限度地控制特定的網路路元件,像是主機端防火牆。
Infrastructure-as-a-Service (IaaS):
A) is one type of cloud computing service where users pay only for the computing capacity they
actually use.
B) is a cloud-based service which provides software applications to users on demand.
C) is a cloud-based service that provides a platform for software development. Iaas provides
D) provides users with a service-oriented architecture for their systems. processing,storage,and
networking resources
E) provides cloud users with ubiquitous networking environment.

Which of the following is not a part of the IT infrastructure ecosystem found in firms?
A) Consultant and system integrators
B) Internet platforms
C) Operating system platforms 還有Computer Hardware platforms、Data management
storage、 Networking/ Telecommunications
D) Enterprise software applications
E) Virtual reality systems
Which of the following enables a single physical resource (such as a server or a storage
device) to appear to the user as multiple logical resources?
A) Cloud computing
B) Autonomic computing
C) Virtualization
D) Multicore processing
E) Ubiquitous computing

Firms that allow employees to use their own devices are embracing which of the following?
A) Wearable computing
B) Mobile consolidation
C) Cloud computing
D) BYOD
E) Self computing

SaaS refers to:


A) supplying online access over networks to storage devices and storage area network
technology.
B) managing combinations of applications, networks, systems, storage, and security as well as
providing Web site and systems performance monitoring to subscribers over the Internet.
C) self-contained services that communicate with each other to create a working software
application.
D) easy-to-use software tools for displaying Web pages.
E) hosting and managing access to software applications delivered over the Internet to clients on
a subscription basis.

Which of the following refers to the ability of a computer, product, or system to expand to
serve a larger number of users without breaking down?
A) Modality
B) Scalability
C) Expandability
D) Disintermediation
E) Customizability
Chapter 7 Telecommunications, the Internet, and Wireless Technology

The Internet is based on which three key technologies?


A) TCP/IP, HTML, and HTTP
B) TCP/IP, HTTP, and packet switching
C) Client/server computing, packet switching, and the development of communications standards
for linking networks and computers
D) Client/server computing, packet switching, and HTTP
E) Email, instant messaging, and newsgroups

Which of the following is not a characteristic of packet switching?


A) Packets travel independently of each other.
B) Packets are routed through many different paths.
C) Packet switching requires point-to-point circuits.
D) Packets include data for checking transmission errors.
E) Packets are reassembled into the original message when they reach their destinations.

Client/server computing is a:
A) network that connects sensors to desktop computers.
B) network where centralized mainframe computers serve local devices.
C) centralized model of computing for large corporations.
D) distributed computing model where clients are linked to one another through a network that is
controlled by a network server computer.
E) centralized computing model where local computers are connected to one another by a
network.

Which type of network treats all processors equally and allows peripheral devices to be
shared without going to a separate server?
A) MAN; B) Wireless; C) LAN; D) Windows domain network; E) Peer-to-peer

What service converts natural language names to IP addresses?


A) HTML; B) FTP; C) IP; D) HTTP; E) DNS

IPv6 has been developed in order to:


A) update the packet transmission protocols for higher bandwidth.
B) create more IP addresses.
C) allow for different levels of service.
D) support Internet2.
E) reduce excess IP addresses.
The most common web servers today are:
A) Microsoft IIS and IBM HTTP Server.
B) WebSTAR and Netscape Server.
C) IBM HTTP Server and Apache HTTP Server.
D) Netscape Server and Apache HTTP.
E) Apache HTTP Server and Microsoft IIS.

Which of the following statements is not true about search engines?


A) They are arguably the Internet's "killer app."
B) They have solved the problem of how users instantly find information on the Internet.
C) They are monetized almost exclusively by search engine marketing.
D) There are hundreds of search engines vying for user attention, with no clear leader having yet
emerged.
E) Users are increasingly using search engines on mobile devices.

A(n) ________ is a commercial organization with a permanent connection to the Internet


that sells temporary connections to retail subscribers.
A) RSS; B) WAN; C) NFP; D) ISP; E) FTP

The Internet of Things (IoT) refers to:


A) the fact that nearly everyone has some kind of computer today.
B) the idea that nearly everyone in the United States is connected to the Internet.
C) billions of Internet-connected sensors.
D) the role of computer processors in automobiles.
E) the idea that cars, planes, factories, and government are all connected to the Internet.

Which of the following statements about RFID is not true?


A) RFIDs transmit only over a short range.
B) RFIDs use an antenna to transmit data.
C) Microchips embedded in RFIDs are used to store data.
D) RFIDs require line-of-sight contact to be read.
E) RFID tags and antennas come in a variety of shapes and sizes.

Which of the following statements about 5G is true?


A) 5G is built on the foundation of 4G networks.
B) 5G will transmit data in the megabyte range.
C) 5G will be able to transmit data in the gigabit range.
D) 5G will have longer transmission delays.
E) 5G is not currently being developed by large Internet network providers.

You might also like