Experiencing MIS 6e David Kroenke Randall Boyle (Test Bank All Chapters, 100% Original Verified, A+ Grade) Experiencing MIS, 6e (Kroenke) Chapter 1 The Importance of MIS 1) The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law. A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 2) Which of the following statements is true of Moore's Law? A) It is based on the technological advancements in weapon manufacturing. B) It made the cost of data processing, communications, and storage essentially zero. C) It states that the total number of transistors produced in the world doubles every 18 months. D) It has resulted in obsoleting the use of transistors. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 3) Which of the following is a result of Moore's law? A) The risk of technology becoming obsolete has decreased. B) The price to performance ratio of computers has fallen dramatically. C) The outsourcing of nonroutine skills has increased drastically. D) The cost of data processing has increased considerably. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Which of the following is true about the impact of Moore's Law on business professionals? A) They need to be able to assess, evaluate, and apply emerging information technology to business. B) They have to concentrate more on developing routine skills than nonroutine skills. C) They need to be able to develop better communication and information technologies. D) They no longer need to focus on skills such as abstract reasoning and collaboration. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 5) Because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be ________. A) considered a nonroutine cognitive skill B) a strong marketable skill C) outsourced to the lowest bidder D) sufficient to attain job security Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 6) Which of the following is an impact of rapid technological change on job security? A) Routine skills have more demand. B) Nonroutine cognitive skills have gained more market value. C) Nonroutine jobs are outsourced, thus reducing the need of an in-house workforce. D) Routine skills are no longer required to complete a task. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Which of the following statements is true of nonroutine cognitive skills? A) They have become less marketable. B) They increase an individual's job security. C) They do not experience any impact of technological changes. D) They are usually outsourced by organizations to the lowest bidder. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 8) ________ is the ability to make and manipulate models. A) Abstract reasoning B) Cognitive acceleration C) Adaptive learning D) Holacracy Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 9) ________ is the ability to model the components of a unit, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Systems thinking B) Collaboration C) Adaptive learning D) Critical reasoning Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
10) Which of the following best describes collaboration? A) It is the ability of an individual to model the components of the system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. B) It is the ability to assess, evaluate, and apply emerging information technology to business. C) It is the activity of two or more people working together to achieve a common goal, result, or work product. D) It is the activity of constructing or modifying models with the help of one's nonroutine cognitive skills. Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 11) In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test? A) collaboration B) cognitive acceleration C) systems thinking D) facilitation Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Application 12) Patricia, the marketing manager of a manufacturing firm, plans new marketing strategies with the help of her subordinates by providing and receiving critical feedback. Here, Patricia is displaying effective ________. A) collaboration B) cognitive acceleration C) virtualization D) abstraction Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Application 4 Copyright © 2016 Pearson Education, Inc.
13) Which of the following is necessary for effective collaboration? A) modeling the components of a system B) focusing on individual goals C) proper division of tasks D) giving and receiving critical feedback Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 14) ________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Experimentation B) Abstraction C) Systems thinking D) Collaboration Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 15) Marketing managers planning to use new social networking technologies to strengthen their market presence are portraying their ________. A) ability to experiment B) routine skills C) collaboration skills D) ability to outsource work Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Application
5 Copyright © 2016 Pearson Education, Inc.
16) In a job interview, Roy is asked to use a product that he has never used before and is unfamiliar with its functioning. Which of the following skills is the interviewer trying to test? A) systems thinking B) abstract reasoning C) collaboration skills D) ability to experiment Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Application 17) Moore's Law states that the speed of a computer doubles every 18 months. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 18) Future business professionals need to be able to apply information technology to business. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 19) The number of businesses adopting new technologies has seen a downfall over the years. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
20) The knowledge of managing information systems can lead to greater job security. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 21) Increased outsourcing has made nonroutine skills less marketable. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 22) A marketable skill has no impact on job security. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 23) Routine skills are outsourced to the lowest bidder because the cost of data processing, storage, and communications is essentially zero. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 24) Strong nonroutine cognitive skills are more in demand than routine skills. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
25) Abstract reasoning is one of the components of strong nonroutine cognitive skills. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 26) Critical feedback undermines collaboration. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 27) Effective collaboration is all about being nice to one's team members. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 28) Professionals in the 21st century need to be able to experiment in order to have greater job security. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 29) Successful experimentation is throwing buckets of money at every crazy idea that enters one's head. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 8 Copyright © 2016 Pearson Education, Inc.
30) When a user is provided with an unfamiliar program and asked to use it, he or she is being tested on their ability to collaborate effectively. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 31) Define Moore's Law and explain how the phenomenon described by it affects business. Answer: Moore's Law states that the number of transistors per square inch on an integrated chip doubles every 18 months. The more common version of this is expressed as, "The speed of a computer chip doubles every 18 months," which is incorrect. Due to the impact of Moore's Law, the price to performance ratio of computers has fallen dramatically. Moore's Law is the principal reason why data storage and data transmission are essentially free today. New businesses like YouTube and Facebook have taken advantage of the opportunities offered by this development. AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 32) What is a marketable skill? Answer: A marketable skill used to be that one could name particular skills, such as computer programming, tax accounting, or marketing, as examples of marketable skills. But today, because of Moore's Law, because the cost of data processing, storage, and communications is essentially zero, any routine skill can and will be outsourced to the lowest bidder. One has to develop strong nonroutine cognitive skills to be more successful and such skills are called marketable skills. Abstract reasoning, systems thinking, collaboration, and the ability to experiment are also classified as marketable skills. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
33) What is abstract reasoning? Answer: Abstract reasoning is the ability to make and manipulate models. Constructing a model from the five components of an information system is an example of abstract reasoning. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 34) What is meant by systems thinking? Answer: Systems thinking is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. It shows how components' inputs and outputs relate to one another. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 35) What is collaboration? How can one ensure effective collaboration? Answer: Collaboration is the activity of two or more people working together to achieve a common goal, result, or work product. It means to develop ideas and plans with others in a team and to provide and receive critical feedback. Effective collaboration is not about being nice. In fact, surveys indicate the single most important skill for effective collaboration is to give and receive critical feedback. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 36) What is experimentation? Explain its importance. Answer: Experimentation is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. Fear of failure paralyzes many good people and many good ideas. This can be overcome by having the ability to experiment. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.1: Why is introduction to MIS the most important class in the business school? Classification: Concept 10 Copyright © 2016 Pearson Education, Inc.
37) A group of components that interact to achieve some purpose is referred to as a(n) ________. A) system B) element C) unit D) entity Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 38) Which of the following is an example of a hardware component of an information system? A) Web browser B) operating system C) storage disk D) data file Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 1.2: What is an information system? Classification: Concept 39) The five-component framework of an information system consists of computer hardware, software, data, people, and ________. A) documents B) procedures C) objectives D) results Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
40) In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device? A) hardware B) software C) data D) procedure Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Application 41) An information system is a group of components that interact to produce information. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 42) The methods used to start a program and save a file are referred to as procedures. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 43) Building information systems requires many different skills besides those of programmers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 44) The use of information systems is restricted to the field of business. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 1.2: What is an information system? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
45) Describe an information system. Answer: A system is a group of components that interact to achieve some purpose. An information system (IS) is a group of components that interact to produce information. An IS is based on the five-component framework of computer hardware, software, data, procedures, and people. These five components are present in every information system–from the most simple to the most complex. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 46) Describe the five components of an information system using an example. Answer: The five components of an information system are computer hardware, software, data, procedures, and people. For example, when one uses a computer to write a class report, he or she is using hardware (the computer, storage disk, keyboard, and monitor), software (Word, WordPerfect, or some other word-processing program), data (the words, sentences, and paragraphs in his or her report), procedures (the methods he or she uses to start the program, enter his or her report, print it, and save and back up his or her file), and people (you). AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.2: What is an information system? Classification: Concept 47) Which of the following statements is true about the management and use of information systems? A) An employee must be a programmer to manage information systems. B) Information systems must be adapted to new requirements. C) Information systems need not be maintained after development. D) Organizations with dynamic business environments do not use information systems. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
48) Why is it important for business professionals to take an active role in developing and managing information systems? A) They know how to create a database and configure computers. B) They are the people who know how to build networks. C) They know whether a system meets their needs and requirements. D) They are the lone users of information systems. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept 49) Which of the following is a critical responsibility of business professionals in using information systems? A) protecting the security of a system and its data B) reprogramming a system to meet changing needs C) creating and modifying a system's databases D) building and configuring additional networks Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept 50) Which of the following reasons is valid for a company to create a new information system? A) to project a modern image B) to avoid falling behind the technology curve C) to help employees achieve the strategies of the business D) to show its social networking presence Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.3: What is MIS? Classification: Concept 51) Businesses do not use information systems to achieve their strategies. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 1.3: What is MIS? Classification: Concept 14 Copyright © 2016 Pearson Education, Inc.
52) Information systems should be created by a business only if they help achieve the strategies of that business. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 1.3: What is MIS? Classification: Concept 53) Define management information systems. What are the key elements of its definition? Answer: Management information system is the management and use of information systems that help businesses achieve their strategies. This definition has three key elements: management and use, information systems, and strategies. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept 54) Explain the management and use of information systems. Answer: Information systems must be developed, maintained and, because business is dynamic, they must be adapted to new requirements. To create an information system that meets specific needs, one will have to take an active role in that system's development. In addition to management tasks, he or she will also have important roles to play in the use of information systems. For example, when using an information system, there will be responsibilities for protecting the security of the system and its data. One may also have tasks for backing up data. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
55) What are the points that one should keep in mind when deciding to implement a management information system (MIS)? Answer: When deciding to implement an MIS, one needs to keep in mind that information systems are not created for exploring technology. They are not created so that the company can be "modern" or so that the company can show it has a social networking presence on the Web. They are not created because the information systems (IS) department thinks they need to be created or because the company is "falling behind the technology curve." Information systems exist to help people who work in a business to achieve the strategies of that business. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 1.3: What is MIS? Classification: Concept 56) ________ refers to the products, methods, inventions, and standards that are used to produce information. A) Information technology B) Information processing C) Simulation D) Product specification Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept 57) Which of the following statements is true about information systems? A) They can be bought off the shelf. B) They are a group of components that produce information. C) They drive the development of information technology. D) They are not susceptible to the changing needs of the market. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
58) Which of the following components distinguishes information systems from information technology? A) people B) database structure C) software D) hardware Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept 59) Information systems and information technology are not the same. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept 60) Information systems can be bought, whereas information technology cannot be bought. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
61) Explain the difference and the relationship between information technology (IT) and information systems (IS). Answer: Information technology and information systems are two closely related terms, but they are different. Information technology (IT) refers to the products, methods, inventions, and standards that are used for the purpose of producing information. IT pertains to the hardware, software, and data components. An information system (IS) is an assembly of hardware, software, data, procedures, and people that produces information. Information technology drives the development of new information systems. Users can buy IT; they can buy or lease hardware, they can license programs and databases, and they can even obtain predesigned procedures. Ultimately, however, it is the people who execute those procedures to employ the new IT. For any new system, users will always have training tasks (and costs), they will always have the need to overcome employees' resistance to change, and they will always need to manage the employees as they use the new system. Hence, one can buy IT, but not IS. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 1.4: Why is the difference between information technology and information systems important to you? Classification: Concept 62) Security systems ultimately depend on the behavior of their ________. A) users B) programmers C) hardware components D) database structures Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 63) Which of the following requirements should a password fulfill in order to be considered strong? A) It should have five characters at the most. B) It should contain a complete dictionary word. C) It should not contain many special characters. D) It should not contain the user name or company name. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
64) A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password? A) It will be difficult to remember. B) It will be very short. C) It can be easily guessed. D) It will create IP address conflicts in networks. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 65) A password is said to be weak if it contains ________. A) a complete dictionary word B) both upper- and lowercase letters C) the numbers 9 and 3 D) three special characters Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 66) Which of the following passwords is the weakest? A) B33rmu9 B) Qw37^T1bb?as C) 3B47qq<3>5!7bdE D) As60$T1dd?dc Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Application
19 Copyright © 2016 Pearson Education, Inc.
67) Which of the following passwords is the strongest? A) sword123 B) RileyyeliR C) paranoid4EVER D) BL@k2V1.0.1 Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 68) Which of the following techniques is best suited for creating memorable, strong passwords? A) using at least one dictionary word in the password B) repeating previously used passwords C) basing passwords on the first letter of the words in a phrase D) creating a password that is related to one's name or company's name Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 69) Which of the following precautions should be taken to protect one's password? A) Do not base it on the first letter of the words in a phrase. B) Do not write it down or share it with others. C) Do not use virtual keyboards to enter it. D) Do not have multiple special characters in it. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 70) Which of the following statements on password etiquette is true? A) If someone asks for the password, do not just give it out. B) Always back up the password by writing it down. C) Never access an information system from a computer that is connected to the Internet. D) Never use the password more than three times a day. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 20 Copyright © 2016 Pearson Education, Inc.
71) What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password? A) The user should refuse to provide the password. B) The user should enter the password themselves. C) The user should say it out loud. D) The user should provide the password through an email. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 72) Strong passwords have a maximum of five characters. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 73) Good passwords contain a complete dictionary word. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 74) If a password is complex, it is ideal to write it on a piece of paper and keep it near the workstation. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 75) Moving away to let another user enter his or her password is a mark of professionalism. Answer: TRUE AACSB: Ethical Understanding and Reasoning Abilities Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 21 Copyright © 2016 Pearson Education, Inc.
76) Users are advised not to share their password with others. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 77) What is the role of users in information security? Answer: Like all information systems, security systems have five components, including people. Thus, every security system ultimately depends on the behavior of its users. If the users do not take security seriously, if they do not follow security procedures, then the hardware, software, and data components of the security system are wasted expenses. Almost all security systems use user names and passwords. Users of information systems in a business organization will be instructed to create a strong password and to protect it. It is vitally important for users to do so. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 78) Explain the characteristics of a strong password. Answer: The characteristics of a strong password are: 1. It should have 10 or more characters, 12 is even better. 2. It should not contain one's user name, real name, or company name. 3. It should not contain a complete dictionary word in any language. 4. It should be different from the previous passwords the user has used. 5. It should contain both upper- and lowercase letters, numbers, and special characters (such as ˜ ! @; # $ % ^; &; * ( ) _ +; — =; { } | [ ] \ : " ; ' <; >;? , . /). AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 79) How can a strong password be made memorable? Answer: One technique for creating memorable, strong passwords is to base them on the first letter of the words in a phrase. The phrase could be the title of a song or the first line of a poem or one based on some fact about one's life. For example, one can take the phrase, "I was born in Rome, New York, before 1990." Using the first letters from that phrase and substituting the character for the word before, one can create the password IwbiR,NY<1990. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept 22 Copyright © 2016 Pearson Education, Inc.
80) Explain the necessary password etiquette to be followed by the users of an information system. Answer: Once users create a strong password, they need to protect it with proper behavior. Proper password etiquette is one of the marks of a business professional. Users should never write down their password, and should not share it with others. They should never ask others for their passwords. If, in a work-related or emergency situation, someone asks for the password, users are advised not to give it out. Instead, it is better for the user to get up, go over to that person's machine, and enter the password. Users should be present while their password is in use, and should ensure that their account is logged out at the end of the activity. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 1.5: What is your role in IS security? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 2 Business Processes, Information Systems, and Information 1) Members of a team in a company need to understand business processes since they need to evaluate new technologies. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.1: Why does the AllRoad team need to understand business processes? Classification: Concept 2) Creating an abstraction or model of their company's current process helps a team have an informed and better discussion about developing new business processes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.1: Why does the AllRoad team need to understand business processes? Classification: Concept 3) A ________ is a network of activities for accomplishing a business function. A) process capital B) task force C) business portfolio D) business process Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 4) In the swimlane format, the specific tasks that need to be accomplished as part of a business process are known as ________. A) decisions B) resources C) activities D) databases Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
5) A ________ is a subset of the activities in a business process that is performed by an actor. A) sequence flow B) resource C) swimlane D) role Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 6) Activities within a business process are shown in ________. A) circles B) rectangles with rounded corners C) squares D) diamonds with rounded corners Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 7) According to the business process modeling notation standard, the start of a business process is symbolized by a ________. A) circle having a thick border B) circle having a narrow border C) square having a thick border D) square having a narrow border Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Which of the following statements is true about roles in a business process? A) A role is the superset of the activities in a business process. B) Roles are grouped in swimlane diagrams according to the number of actors involved. C) The name of a role is written at the top of a swimlane. D) A particular role can be fulfilled by just one person. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 9) Which of the following statements is true of the swimlane format? A) It lists the names of actors on the top to specify individual roles. B) It specifies the tasks that need to be accomplished as part of a business process. C) It illustrates the flow of activities involved in a business process using grids. D) It uses numerals to indicate the start and end of a business process. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 10) According to the business process modeling notation, the end of a business process is symbolized by a ________. A) circle having a thick border B) circle having a narrow border C) square having a thick border D) square having a narrow border Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) A(n) ________ is a collection of data that is stored within a business process. A) repository B) sequence flow C) activity D) resource Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 12) ________ represent the movement of data from one activity to another. A) Data charts B) Data buses C) Data modules D) Data flows Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 13) According to the business process modeling notation standard, an activity with a boxed plus sign inside it indicates a ________. A) subprocess B) data flow C) sequence flow D) data repository Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
14) Which of the following statements is true about business process modeling notation? A) Sequence flows are indicated by dashed lines. B) Data flows are indicated by solid labeled lines. C) A circle with thin border represents a decision. D) The medium of data flow is represented by thick solid lines. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 15) A role is a subset of activities in a business process. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 16) Swimlane diagram is a graphical arrangement in which all the activities for a given role are shown in a single vertical lane. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 17) In some business cases, a role can be fulfilled by an information system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 18) According to the business process modeling notation standard, the start of a business process is symbolized by a circle having a thick border. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
19) According to the business process modeling notation standard, the end of a business process is symbolized by a circle having a narrow border. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 20) According to the business process modeling notation standard, solid lines between activities are called sequence flows. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 21) A collection of files on the Internet is a repository. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 22) Data flows represent the movement of data from one activity to another. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 23) A repository can be printed records stored in a shoebox or a collection of files in the cloud. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
24) In a business process modelling notation diagram, the medium of data delivery is very important. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 25) What is a business process? How are business process modelling notations used in business processes? Answer: A business process is a network of activities for accomplishing a business function. The business process modelling notation is an international standard for creating business process diagrams. These notations are used in the constructing diagrams of business processes. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 26) Briefly describe activities and roles in swimlane format. Answer: Swimlane format is a graphical arrangement in which all of the activities for a given role are shown in a single vertical lane. Each swimlane has activities, which are specific tasks that need to be accomplished as part of the process. A role is a subset of the activities in a business process that is performed by an actor, which is a person, group, department, organization, or information system. The name of the role is written at the top of a swimlane, not people's names. This is because a given role may be fulfilled by many people, or the organization may change the people who are assigned to a given role. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 27) Briefly describe a repository. Answer: A repository is a collection of data that is stored within a business process. A repository can be a cardboard box, a notebook, a list, an Excel spreadsheet, a database, or even a collection of databases. For the purpose of documenting a business process, the particular medium in which repository data is stored is unimportant. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) Briefly describe data flows. Answer: According to the business process modeling notation (BPMN), the labeled dashed lines are called data flows. They represent the movement of data from one activity to another. The data can be delivered via email, text message, over the phone, by fax, or by some other means. In a BPMN diagram, the medium of the data delivery is also unimportant. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.2: How can business process modeling help AllRoad? Classification: Concept 29) ________ is the ratio of benefits to costs. A) Effectiveness B) Efficiency C) Scalability D) Performance rating Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 30) Which of the following statements is true of the dimensions to measure process quality? A) Process effectiveness is determined by the ratio of benefits to costs. B) An effective business process enables an organization to accomplish its strategy. C) If two versions of a business process create the same benefit, the higher cost version is more efficient. D) Cost of infrastructure is not included under cost of business process. Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 31) The outermost components of the information systems framework ________. A) can take action B) can be automated to reduce human intervention C) form a bridge between the human and computer sides D) represent sunk costs Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 8 Copyright © 2016 Pearson Education, Inc.
32) The software and procedure components of the information systems framework are ________. A) actors B) sets of instructions C) the outermost components D) bridges between the human side and the computer side Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 33) The ________ component of the information systems framework provides instructions for people. A) procedure B) software C) hardware D) data Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 34) In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the right. A) hardware B) software C) procedure D) data Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
35) Which of the following components of an information system play the role of actors? A) software and people B) procedures and people C) data and people D) hardware and people Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 36) When activities formerly done by people following procedures are moved to computers that perform the work by following instructions in software, the activities are said to be ________. A) outsourced B) automated C) documented D) systematized Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 37) Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework. A) software side to the human side B) data side to the procedure side C) human side to the computer side D) software side to the hardware side Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Which of the following statements is true of using an information system to improve process quality? A) Information systems that are most user friendly are also most cost effective. B) Information systems are most effective at improving process quality if they are developed solely by technical personnel. C) Information systems can improve process efficiency but not process effectiveness. D) Information systems that are labor saving may not be efficient. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 39) Process effectiveness and process efficiency are the two dimensions in which the process quality can be measured. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 40) An effective business process enables an organization to accomplish its strategy. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 41) Effectiveness is the ratio of benefits to costs. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 42) An activity is considered to be automated when it is characterized by people following procedures. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
43) The outermost components of the symmetrical five-component framework of information systems are data and procedures. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 44) In the five-component framework of information systems, the actors are hardware and people. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 45) In the five-component framework of an information system (IS), data is the bridge between the computer side and the human side. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 46) In an information systems framework, data is considered to be a part of the computer side. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 47) In an information systems framework, software and procedure components are both sets of instructions. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
48) Procedures act as the bridge between the computer and human sides of the five-component framework of an information system (IS). Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 49) Automation is the process in which the work is transferred from human side to computer side. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 50) Automation moves work from the software component to the hardware component. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 51) One of the major benefits of an information system is that it improves process quality. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 52) Information systems can improve process efficiency but not process effectiveness. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
53) Describe the process of automation against the background of the five-component framework of an information system. Answer: The five components of an information system are hardware, software, data, procedures, and people. They are arranged symmetrically in the framework. The outermost components, hardware and people, are both actors–they take action. The software and procedure components are both sets of instructions: Software is instructions for hardware, and procedures are instructions for people. Finally, data is the bridge between the computer side on the left and the human side on the right. When an activity in a business process is handled by an automated system, it means that work formerly done by people following procedures has been moved so that computers now do that work by following instructions in software. Thus, the automation of a process activity consists of moving work from the right-hand side of the five-component information system (IS) framework to the left. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 54) Describe the benefits of using an information system to store vendor and product-related data. Answer: In order to select a vendor, a buyer has to gather data about vendors and products, make analyses of costs and margins, and store the results of those analyses. If an information system (IS) is not used to store these results, accessing past records and results will require a manual search. An IS makes the process of finding reliable data and reports faster and more reliable, improving the efficiency and quality of the business process. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.3: How can information systems improve process quality? Classification: Concept 55) ________ is defined as recorded facts or figures. A) Information B) Substance C) Data D) Content Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
56) John's height is 6 feet 3 inches. This is a type of ________. A) data B) information C) procedure D) content Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 57) The fact that Joe works nine hours per day is an example of ________. A) sample B) content C) information D) data Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 58) People can perceive different information from the same data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.4: What is information? Classification: Concept 59) Repositories are collections of data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 60) Data presented in a meaningful context is known as information. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 15 Copyright © 2016 Pearson Education, Inc.
61) Information is data processed by grouping, comparing, or other similar operations. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 62) Data is knowledge derived from information. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 63) Average wage is knowledge that can be derived from the data of individual wages. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 64) Define information. Answer: The most common definition of information is that information is knowledge derived from data. It can also be defined as the data presented in a meaningful context. The data can be processed by summing, ordering, averaging, grouping, comparing, or other similar operations. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept 65) Explain data with an example. Answer: Data is defined as recorded facts or figures. Information is knowledge derived from data. The facts that an employee of an organization earns $17.50 per hour and that another employee of the same organization earns $25.00 per hour are examples of data. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.4: What is information? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
66) Which of the following refers to information that is based on correct and complete data and has been processed correctly, as expected? A) relevant information B) measurable information C) accurate information D) timely information Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 67) The effectiveness of new online ad programs needs to be evaluated based on the frequency at which a customer clicks those ads. Identify the most effective and efficient method to analyze this data. A) The click ratios must be tracked in real time. B) The data must be saved in batches and processed a few hours later. C) The clicks can be monitored for a short period of time and can be integrated for the total time. D) The sample time at which the maximum data is accumulated is assumed to prevail for the entire cycle. Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 68) Which of the following is a characteristic of good data? A) It must be available in the cloud storage. B) It must be more than just barely sufficient. C) It must be based on incomplete data. D) It must be contextually relevant. Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
69) Which of the following statements is true about data characteristics of quality information? A) Information systems that produce real-time data are less expensive than those that produce data at a later time. B) The timeliness of information can be measured against events. C) Accurate information can be conceived from inaccurate data. D) Data that appears on any Web page is reliable. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 70) Which of the following information is good information for the CEO of a call center? A) hourly variance reports of performance parameters in each queue B) daily report of calls attended by each employee C) real-time information about the average time spent per call by employees D) department-level averages of revenue generation figures Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 71) ________ information is information that directly pertains both to the context and to the subject. A) Timely B) Relevant C) Measurable D) Expensive Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
72) Which of the following statements is true regarding the characteristics of good information? A) Information needs to be more than just barely sufficient for the purpose for which it is generated. B) Information must hold an appropriate relationship between its cost and value. C) Accurate information can be based on incomplete data. D) Good information is just recorded facts and figures. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 73) As long as information is relevant and timely, it need not always be complete. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 74) Data delivered with active graphics need not be cross-checked for accuracy. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 75) Accurate information is based on correct and complete data, and has been processed correctly. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 76) Users develop work-arounds when data from an information system is unreliable. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 19 Copyright © 2016 Pearson Education, Inc.
77) Timeliness of information can be measured against a calendar. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 78) The quality of thinking determines the quality of the information that is produced. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 79) Data needs to be sufficient for the purpose for which it is generated, but just barely so. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 80) Accurate data should be relevant both to the context and to the subject. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 81) All data about an organization are relevant to the higher management. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
82) For data to be worth its cost, an appropriate relationship must exist between the cost of data and its value. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 83) Information systems should not be subject to the same financial analyses to which other assets are subjected. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 84) Describe accurate information. Why does an information system that provides accurate information crucial to an organization? Answer: Good information is accurate information, which is based on correct and complete data, and it has been processed correctly as expected. Accuracy is crucial; business professionals must be able to rely on the results of their information systems. The IS function can develop a bad reputation in an organization if a system is known to produce inaccurate data. In such a case, the information system becomes a waste of time and money as users develop work-arounds to avoid the inaccurate data. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 85) Explain the importance of timeliness of information in an organization. Answer: Good information requires that data be available in time for its intended use. A monthly report that arrives six weeks late is most likely useless. In such a case, the data has arrived long after the decisions that needed that information have been made. An information system that sends a poor customer credit report after the goods have been shipped is unhelpful and frustrating. Timeliness can be measured against a calendar (six weeks late) or against events (for example, before shipping). AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
86) In some cases, developing systems that provide data in near real time is much more difficult and expensive than producing data a few hours later. Provide an example that supports this statement. Answer: A person who works in marketing needs to be able to assess the effectiveness of new online ad programs. He or she wants an information system that will not only deliver ads over the Web, but one that will also enable him or her to determine how frequently customers click on those ads. In this case, determining click ratios in near real time will be very expensive; saving the data in a batch and processing it some hours later will be much easier and cheaper. If the user can manage with data that is a day or two old, the system will be easier and cheaper to implement. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 87) Describe relevant data. Explain the importance of relevant data in an organizational context. Answer: Relevant data is data that directly pertains to both the context and the subject. Considering context, a CEO needs data that is summarized to an appropriate level for his or her job. A list of the hourly wage of every employee in the company is unlikely to be useful. More likely, the CEO needs average wage information by department or division. A list of all employee wages is irrelevant in this context. Data should also be relevant to the subject at hand. If data about short-term interest rates is required to find a possible line of credit, then a report that shows 15-year mortgage interest rates is irrelevant. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept 88) Why is it important for data to be just barely sufficient? Answer: Data needs to be sufficient for the purpose for which it is generated, but just barely so. People are inundated with data; one of the critical decisions that people make each day is what data to ignore. The higher one rises into management, the more data one will be given, and because there is only so much time, the more data one will need to ignore. So data should be sufficient, but just barely. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
89) What are the costs associated with data? When is data considered to be worth its cost? Answer: Data is not free. There are costs for developing an information system, costs of operating and maintaining that system, and costs of time and salary for reading and processing the data the system produces. For data to be worth its cost, an appropriate relationship must exist between the cost of data and its value. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 2.5: What data characteristics are necessary for quality information? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 3 Organizational Strategy, Information Systems, and Competitive Advantage 1) The competitive strategy of an organization determines its ________. A) industry rivals B) functions C) value chains D) strategic alliances Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.1: How does organizational strategy determine information systems requirements? Classification: Concept 2) The competitive strategy followed by an organization is derived from the ________ of its industry. A) function B) structure C) profits D) goals Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.1: How does organizational strategy determine information systems requirements? Classification: Concept 3) Competitive strategy determines an organization's value chain. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.1: How does organizational strategy determine information systems requirements? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Briefly describe how organizational strategy determines the functions of information systems. Answer: Organizations examine the structure of their industry and, from that, develop a competitive strategy. This strategy determines value chains, which, in turn, determine business processes. The nature of business processes determines the requirements and functions of information systems. AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.1: How does organizational strategy determine information systems requirements? Classification: Concept 5) Porter developed the five forces model to help organizations determine the ________. A) potential profitability of an industry B) services of an industry C) reason for the collapse of certain industries D) means for improving resource utilization Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 6) Which of the following statements describes suppliers in a position of strong bargaining power? A) coffee planters during a season of frost that decreases production B) domestic suppliers of corn in the event of removal of import duties on corn C) providers of logistic support when fuel prices have been reduced D) temporary part-time gym instructor Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. Which of the following forces is Simpson's Lawn Services addressing? A) the control exercised by Acme Corp., who supplies Simpson's with lawn mowers B) the power held by the landlord of the Simpson's office space C) the threat posed by Roger's Landscapes, a new competitor D) the bargaining power of the City Football Club who are Simpson's customers Answer: C AACSB: Analytical Thinking Difficulty: Difficult Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Application 8) Porter's five competitive forces can be grouped into two types: forces related to ________ and forces related to supply chain bargaining power. A) pricing B) labor C) competition D) consumers Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 9) The bargaining power of ________ is one of the five competitive forces in Porter's five forces model. A) investors B) competitors C) employees D) customers Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
10) In Porter's five forces model, each of the three competitive forces concerns the danger of ________. A) suppliers favoring rival companies B) customers taking their business elsewhere C) investors refusing to back new projects D) employees not working toward organizational goals Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 11) In Porter's five forces model, the two strength factors that relate to competitive forces are ________ and customer loyalty. A) employee unions B) nature of products C) customer services D) switching costs Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 12) In which of the following cases is the strength of competitive forces low? A) when switching costs are high B) when the prices of rival products are relatively high C) when customers are not loyal to the existing company or brand D) when finding rival products is difficult Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
13) If the price of an alternative is lower than the price of the existing product, and customers perceive similar benefits from both the products, then the ________. A) switching cost is high B) price of the product should be increased to retain market share C) threat from the substitute is strong D) customers' bargaining power decreases Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 14) Which of the following is true if the threat from a substitute is strong? A) Customers are likely to switch to competitors' products. B) Competitors' products are of a lower quality. C) Competitors are yet to overcome the entry barriers. D) Prices of competitors' products are higher. Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 15) Which of the following is true about new entrants? A) They have strong customer loyalty. B) They will have records on customers' purchase habits. C) They are yet to develop relationships with suppliers. D) They can lock in suppliers to gain a competitive advantage. Answer: C AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
16) The strength of bargaining power forces depends on the availability of substitutes and ________ compared to the size of suppliers or customers. A) the amount of profit made annually B) the relative size of the firm C) the production capacity D) the relative size of the employee union Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 17) Which of the following statements describes a scenario in which the bargaining power of a supplier is strong? A) Competitors have decreased demand for raw materials. B) The availability of raw materials is limited. C) The supplier has excess inventory. D) There are many suppliers providing the same raw materials for comparable prices. Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 18) The bargaining power of a customer is weak if ________. A) the availability of a rival product is limited B) the cost of switching to a substitute is low C) competitors offer products with same benefits at lower prices D) new entrants are offering a product that uses more recent technology Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 19) Porter originally developed the five forces model in order to understand organizations' workforce. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 6 Copyright © 2016 Pearson Education, Inc.
20) According to Porter's five forces model, a company is profitable if all the five competitive forces are strong. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 21) Porter identified the bargaining power of competitors as one of the competitive forces. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 22) The three competitive forces in Porter's model concern the danger of customers taking their business elsewhere. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 23) If the costs of switching to another vendor are high, then the strength of the competitive forces is low. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 24) The strength of bargaining power forces does not depend on the availability of substitutes. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
25) Typically, as an individual, a customer has substantial bargaining power over a large manufacturing industry. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 26) Availability of substitutes plays a role in determining the bargaining power of suppliers. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 27) Vendor knowledge and vendor relationships serve as a barrier to entry for new competitors. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept 28) Describe Porter's five forces model. Answer: Organizational strategy begins with an assessment of the fundamental characteristics and structure of an industry. Porter developed the five forces model to help organizations determine the potential profitability of an industry. Over the years, this model has also been applied to understand organizations' competitive environments. Porter's five competitive forces can be grouped into two types: forces related to competition and forces related to supply chain bargaining power. The competitive forces include competition from vendors of substitutes, competition from new competitors, and competition from existing rivals. The bargaining power forces include the bargaining power of suppliers and the bargaining power of customers. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. Organizations examine these five forces and determine how they intend to respond to them. This examination leads to development of competitive strategies. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.2: What five forces determine industry structure? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) An organization responds to the structure of its industry by choosing a ________ strategy. A) competitive B) growth C) leadership D) diversification Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 30) Which of the following competitive strategies does a company follow if it produces a uniquely formulated anti-ageing face cream targeted at women above the age of forty? A) providing the lowest cost across the industry B) providing a better product across the industry C) focusing on lowering the cost within an industry-segment D) focusing on product differentiation within an industry-segment Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 31) A firm introduces a new range of laptops that concentrate on delivering good graphics performance. Which of the following competitive strategies has the firm adopted if these laptops have relatively low prices? A) focused differentiation B) focused low cost C) industry-wide differentiation D) industry-wide low cost Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
32) Which of the following is an example of a competitive strategy employed by a firm? A) increasing the price of its product when raw material prices increase B) laying off staff in order to cut down costs during a recession period C) advertising its products nationwide like its competitor organizations D) launching a unique product targeted at a section of consumers Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 33) According to Porter, to be effective, an organization's goals, objectives, culture, and activities must be consistent with the organization's ________. A) functions B) competitors C) strategy D) workforce Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 34) An organization can choose to either minimize cost or maximize differentiation to gain a competitive advantage. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 35) Focused differentiation is a strategy in which a product is unique and is used by a wide range of consumers. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
36) According to Porter, to be effective an organization's goals, objectives, cultures, and activities must be consistent with the organization's strategy. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 37) What are the four competitive strategies based on Porter's five forces model? Answer: An organization responds to the structure of its industry by choosing a competitive strategy. Porter defined four fundamental competitive strategies. According to Porter, a firm can engage in one of these four fundamental competitive strategies. An organization can focus on being the cost leader, or it can focus on differentiating its products from those of the competition. Further, an organization can employ the cost or differentiation strategy across an industry, or it can focus its strategy on a particular industry segment. To be effective, the organization's goals, objectives, culture, and activities must be consistent with the organization's strategy. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.3: What is competitive strategy? Classification: Concept 38) Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service. A) margin B) profit C) price D) value Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 39) Which of the following is true of a value chain? A) It is a network of value-creating activities. B) It consists of only primary activities. C) It is specific to manufacturing industries. D) It nullifies the importance of support activities. Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
40) A business that selects a differentiation strategy ________. A) adds cost to an activity, provided it has a positive margin B) provides essential functions at lowest costs C) imitates rival companies' strategy and products D) always tries to price its products' higher than its competitors' products Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 41) The difference between the value that an activity generates and the cost of the activity is called the ________. A) equity B) liability C) overhead D) margin Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 42) Which of the following primary activities describes collecting, storing, and physically distributing products to buyers? A) customer service B) sales and marketing C) outbound logistics D) operations/management Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
43) Which of the following primary value chain activities induce buyers to purchase a product and provide a means for them to do so? A) inbound logistics B) sales and marketing C) outbound logistics D) operations/management Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 44) Which of the following statements describes a customer service activity? A) receiving and storing materials B) transforming customers' inputs into the final product C) inducing buyers to purchase the product D) assisting customers with the use of the product Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 45) Which of the following is true of supporting activities? A) Their contribution toward a product's value is negligible. B) Their contributions to margin can be calculated easily. C) Customer service is considered as a supporting activity. D) Negotiation of prices is considered as a supporting activity. Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
46) Each stage of the value chain not only adds value to the product but also ________. A) improves supplier relationships B) accumulates costs C) devalues the final product D) attracts competitors Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 47) Which of the following is a primary activity in the value chain? A) process of finding vendors B) setting up contractual arrangements C) negotiating prices D) delivering products to consumers Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 48) ________ includes general management, finance, accounting, legal, and government affairs. A) Human resources B) Research and development C) Firm infrastructure D) Operations management Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
49) Porter's model of business activities includes ________, which are interactions across value activities. A) linkages B) evaluations C) iterations D) operations Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 50) A manufacturing system uses sales forecasts to plan production. It uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. This ultimately leads to reduced inventory costs. Which of the following is being used to reduce the inventory cost? A) linkages B) margins C) competitive strategy D) support activities Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 51) Organizations analyze the structure of their industry and use that analysis to formulate a competitive strategy. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 52) A business that selects a differentiation strategy will always structure itself around least-cost activities. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
53) The difference between the value that an activity generates and the cost of the activity is called the margin. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 54) Customer service falls under the category of supporting activities in a value chain. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 55) Procurement falls under the category of primary activities in a value chain. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 56) Porter's definition of technology is narrow because it includes only research and development. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 57) Support activities are business functions that relate directly to the production of the organization's products or services. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
58) A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 59) Each stage of the generic value chain accumulates costs and reduces the value of the product. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 60) The support activities in the generic value chain facilitate the primary activities and contribute only indirectly to the production, sale, and service of the product. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 61) Receiving, storing, and disseminating inputs to a product is an operations management activity. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 62) A company uses the outbound logistics activity to deliver the finished product to a customer. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
63) Porter's model of business activities includes linkages, which are interactions across value activities. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 64) Firm infrastructure excludes general management, finance, accounting, legal, and government affairs. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 65) It is easier to calculate the margin of supporting activities. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 66) Value chain analysis has a direct application to manufacturing businesses. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 67) Manufacturing systems avoid linkages to reduce inventory costs. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
68) Value chains exist in service-oriented companies. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 69) Inbound and outbound logistics are the primary value generators in a service-oriented company. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 70) How does competitive strategy determine value chain structure? Answer: Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. A value chain is a network of value-creating activities. Organizations analyze the structure of their industry and formulate a competitive strategy using that analysis. They then need to organize and structure the organization to implement that strategy. If, for example, the competitive strategy is to be a cost leader, then business activities need to be developed to provide essential functions at the lowest possible cost. A business that selects a differentiation strategy would not necessarily structure itself around least-cost activities. Instead, such a business might choose to develop more costly systems, but it would do so only if those systems provided benefits that outweighed their risks. AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 71) Distinguish between a primary and a support activity in the value chain. Answer: Primary activities are business functions that relate directly to the production of an organization's products or services. Primary activities include inbound logistics, operations, customer service, and sales and marketing. These activities add value to a product. Support activities are business functions that assist and facilitate the primary activities. Supporting functions add value to a product indirectly. They also have costs and contribute to a margin. It is difficult to calculate their margins because the specific value added is difficult to measure. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
72) Differentiate between value and margin. Answer: Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. The difference between the value that an activity generates and the cost of the activity is called the margin. A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 73) Describe the primary activities in a value chain using an example. Answer: In a bicycle manufacturing unit, the primary activities of a value chain are followed. The manufacturer acquires raw materials using the inbound logistics activity. This activity concerns the receiving and handling of raw materials and other inputs. The accumulation of those materials adds value in the sense that even a pile of unassembled parts is worth something to some customer. A collection of the parts needed to build a bicycle is worth more than an empty space on a shelf. The value is not only the parts themselves but also the time required to contact vendors for those parts, to maintain business relationships with those vendors, to order the parts, to receive the shipment, and so forth. In the operations activity, the bicycle maker transforms raw materials into a finished bicycle, a process that adds more value. Next, the company uses the outbound logistics activity to deliver the finished bicycle to a customer. Of course, there is no customer to send the bicycle to without the marketing and sales value activity. Finally, the service activity provides customer support to the bicycle users. AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
74) What is a value chain? List the primary activities in a value chain. Answer: A value chain is a network of value-creating activities. The generic value chain developed by Porter consists of five primary activities and four support activities. Primary activities are business functions that relate directly to the production of the organization's products or services. The primary activities are: a. Inbound logistics—deals with receiving, storing, and disseminating inputs to the product. b. Operations—involves transforming inputs into the final product. c. Outbound logistics—deals with collecting, storing, and physically distributing the product to buyers. d. Marketing and sales—involves inducing buyers to purchase the product and providing a means for them to do so. e. Customer service—involves assisting customer's use of the product and thus maintaining and enhancing the product's value. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 75) Explain value chain linkages. Answer: Porter's model of business activities includes linkages, which are interactions across value activities. For example, manufacturing systems use linkages to reduce inventory costs. Such a system uses sales forecasts to plan production; it uses the production plan to determine raw material needs and then uses the material needs to schedule purchases. The end result is justin-time inventory, which reduces inventory sizes and costs. Value chain analysis has a direct application to manufacturing businesses and also exists in service-oriented companies. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 76) How did Porter define technology, human resources, and firm infrastructure? Answer: Porter defined technology broadly. It includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures. Human resources include recruiting, compensation, evaluation, and training of fulltime and part-time employees. Firm infrastructure includes general management, finance, accounting, legal, and government affairs. AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
77) Describe the support activities in a value chain. Answer: Support activities are business functions that assist and facilitate the primary activities. The support activities in the generic value chain facilitate the primary activities and contribute only indirectly to the production, sale, and service of the product. They include procurement, which consists of the processes of finding vendors, setting up contractual arrangements, and negotiating prices. Porter defined technology broadly. It not only includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures. Human resources includes recruiting, compensation, evaluation, and training of full-time and part-time employees. Firm infrastructure includes general management, finance, accounting, legal, and government affairs. Supporting functions add value, albeit indirectly, and they also have costs. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.4: How does competitive strategy determine value chain structure? Classification: Concept 78) According to Porter, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins. A) create sufficient value to cover their costs B) provide products at lowest costs to customers C) develop and adopt new technologies D) increase procurement Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 79) Which of the following statements is true of business processes? A) If a value chain's margin is negative, the value should be decreased. B) Value chain activities differ based on the business processes being used. C) If a value chain's margin is negative, the costs of the value chain should be increased. D) The processes implementing a value chain must create sufficient value to cover their costs. Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
80) Business processes implement value chains or portions of value chains. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 81) Each value chain is supported by one or more business processes. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 82) Value chain activities are not dependent on the competitive strategies used by organizations. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 83) Two companies with the same value chain activities will have the same business processes. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 84) If a value chain's margin is negative, the company must reduce the cost of the value chain. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
85) What is the criterion on which business processes should run? Answer: According to Porter, whether business processes are low-cost or high-service, these processes and systems used must create sufficient value that they will more than cover their costs. If not, the margin of those systems will be negative. If a value chain's margin is negative, the company must make some change. Either the value must be increased, or the costs of the value chain need to be reduced. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.5: How do value chains determine business processes and information systems? Classification: Concept 86) Which of the following is a product implementation principle of competitive advantage? A) raise barriers to market entry B) enhance existing products or services C) establish alliances with other organizations D) lock in customers and buyers Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 87) Which of the following strategies is also called establishing high switching costs? A) increasing production B) locking in suppliers C) reducing output D) locking in customers Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
88) Which of the following is a process implementation principle of competitive advantage? A) creating a new product B) enhancing existing services C) establishing alliances with other organizations D) differentiating a service Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 89) Which of the following is least likely to be an outcome of organizations forming alliances with each other? A) promotion of product awareness B) development of market size C) establishment of standards D) increment of purchasing costs Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 90) Jupiter Shop is an online store. Customers have to create an online account to purchase products. The purchased products are delivered free of cost. The address of delivery is stored, so that customers can choose the same address for future purchases. Jupiter Shop features seasonal discounts and exchange offers. It also accumulates redeemable points for regular shoppers. Which of the following statements describes the use of information systems (IS) by Jupiter Shop to lock in customers? A) providing free home delivery B) saving the delivery addresses C) offering seasonal discounts D) collecting feedback online Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept
25 Copyright © 2016 Pearson Education, Inc.
91) An information system can be part of a product, but it cannot provide support for a product or service. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 92) Raising barriers to market entry is a product implementation principle. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 93) Establishing alliances with other organizations promotes product awareness. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 94) Enhancing existing products and services is a competitive advantage created by the implementation of business processes. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 95) How can one develop competitive strategies using products? How can information systems help in the process? Answer: Some competitive techniques are created through products and services, while some are created through the development of business processes. There are three principles that concern products and services. Organizations gain a competitive advantage by creating new products or services, by enhancing existing products or services, and by differentiating their products and services from those of their competitors. An information system can be part of a product or it can provide support for a product or service. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept 26 Copyright © 2016 Pearson Education, Inc.
96) Describe some competitive advantage strategies that are based on business processes. Answer: Some of the competitive strategies that are based on business processes include: 1. Locking in customers—organizations can lock in customers by making it difficult or expensive for customers to switch to another product. This strategy is also called establishing high switching costs. 2. Locking in suppliers—organizations can lock in suppliers by making it difficult to switch to another organization, or, stated positively, by making it easy to connect to and work with the organization. 3. Creating entry barriers—competitive advantage can be gained by creating entry barriers that make it difficult and expensive for new competition to enter the market. 4. Establishing alliances—another means to gain competitive advantage is to establish alliances with other organizations. Such alliances establish standards, promote product awareness and needs, develop market size, reduce purchasing costs, and provide other benefits. 5. Reducing costs—organizations can gain competitive advantage by creating better business processes at reduced costs. Such reductions enable the organization to reduce prices and/or to increase profitability. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 3.6: How do information systems provide competitive advantages? Classification: Concept
27 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 4 Hardware and Software 1) The ________ selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. A) central processing unit (CPU) B) random access memory (RAM) C) hard disk D) plotter Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 2) A dual-processor computer has ________ CPUs. A) eight B) four C) two D) sixteen Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 3) ________ computers have four central processing units (CPUs). A) Quad-processor B) Dual-processor C) Tri-processor D) Tetra-processor Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Which of the following statements is true of a server? A) It stores the results of computations in the main memory. B) It provides access only for one user at a time. C) It supports processing requests from remote computers. D) It creates a backup of all information within a system. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 5) A ________ is used to receive and process thousands of requests from a large number of users. A) cache memory B) stand-alone server C) server farm D) client computer Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 6) Computers represent data using binary digits called ________. A) dots B) pixels C) tags D) bits Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Bits are grouped into 8-bit chunks called ________. A) bytes B) kilobytes C) terabytes D) megabytes Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 8) One ________ is equivalent to 1,024 kilobytes. A) terabyte B) megabyte C) gigabyte D) bit Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 9) One ________ is equivalent to 1,024 gigabytes. A) petabyte B) terabyte C) megabyte D) kilobyte Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 10) A ________ is a collection of 1,024 bytes. A) kilobyte B) megabyte C) gigabyte D) terabyte Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
11) The speed of a central processing unit (CPU) is expressed in cycles called ________. A) hertz B) bits C) bytes D) pixels Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 12) A device's cache and main memory are ________. A) volatile B) nonvolatile C) stable D) nonperishable Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 13) Which of the following is an example of nonvolatile memory? A) cache memory B) main memory C) magnetic disk D) RAM drive Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
14) The memory of a device is said to be nonvolatile if ________ when the system is restarted. A) its contents are destroyed B) the memory becomes unusable C) a new memory is replicated D) its contents are retained Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 15) If the contents of a device are lost when the power is turned off, the memory of the device is said to be ________. A) nonvolatile B) volatile C) random D) discrete Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 16) Computer hardware consists of electronic components that input, process, output, and store data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 17) The central processing unit is referred to as the brain of a computer. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) High-end computers can have as many as 16 central processing units. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 19) The speed and costs of central processing units are the same across multiple hardware vendors. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 20) Some computers have two or more central processing units (CPUs). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 21) The central processing unit (CPU) of a computer reads data and instructions only from a read-only memory. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 22) Optical disks are non-portable storage devices. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
23) USB flash drives are used to back up data and transfer it from one computer to another. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 24) Main memory is also called read-only memory. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 25) A hard drive is much faster than a solid-state storage device. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 26) A server farm can process only one service request per minute. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 27) A bit is either a zero or a one. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) A specification that a computing device has 100 million bytes of memory means that the device could hold up to 100 million characters. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 29) One gigabyte is equivalent to 1,024 terabytes. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 30) An exabyte is equivalent to 1,024 petabytes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 31) A terabyte is a larger unit than a petabyte. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 32) A computer's performance depends on the speed of its central processing unit (CPU). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
33) Magnetic and optical disks are examples of nonvolatile memory. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 34) Saving one's work frequently is advised to tackle the issue of memory volatility. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 35) Explain the basic constituents and the different types of computer hardware. Answer: Computer hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. All hardware today has more or less the same components, at least to the level that is important to us. The common types of computer hardware used are: a) Personal computers (PCs): PCs are classic computing devices that are used by individuals. b) Server: It is a computer that is designed to support processing requests from many remote computers and users. c) Clients: PCs, tablets, and smartphones that access servers are called clients. d) Server farm: It is a collection of, typically, thousands of servers. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 36) Briefly describe the functions and working of a central processing unit (CPU). Answer: Every computer has a central processing unit (CPU), which is sometimes called "the brain" of the computer. The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. Some computers have two or more CPUs. A computer with two CPUs is called a dual-processor computer. Quad-processor computers have four CPUs. Some high-end computers have 16 or more CPUs. CPUs vary in speed, function, and cost. The CPU works in conjunction with main memory. The CPU reads data and instructions from memory, and then stores the results of computations in main memory. In addition to random access memory, RAM, and one or more CPUs, all computers also include storage hardware, which is used to save data and programs. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 9 Copyright © 2016 Pearson Education, Inc.
37) Differentiate between client and server computers. Answer: A server is a computer that is designed to support processing requests from many remote computers and users. Personal computers (PCs), tablets, and smartphones that access servers are called clients. A server is essentially a PC on steroids, and it differs from a PC principally because of what it does. The relationship between PCs and servers is similar to the relationship between clients and servers at a typical restaurant: In short, servers take requests from clients and then bring them things. In restaurants, these things are food, drinks, and silverware. Similarly, in computing environments, servers can send webpages, email, files, or data to PCs or other devices. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.1: What do business professionals need to know about computer hardware? Classification: Concept 38) The ________ refers to the idea in which objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. A) Premium Internet B) Symbian C) Internet of Things D) server farm Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept 39) Which of the following is most likely to be an advantage of self-driving cars? A) Fewer cars will be shared by family members. B) More auto loans will be taken. C) More insurance policies will be taken. D) Fewer accidents will occur. Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
40) Which of the following is most likely to be a disadvantage of self-driving cars? A) More accidents will occur. B) More parking lots will have to be built. C) More people will use cars and avoid planes or trains. D) More stress during commute. Answer: C AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept 41) Objects that are connected to the Internet are increasingly being embedded with hardware capable of sensing, processing, and transmitting data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept 42) Objects connected to a network can share data with any other application, device, or service. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept 43) How can the Internet of Things act as a disruptive force to change the way in which businesses function? Answer: The Internet of Things is the idea that objects are becoming connected to the Internet so that they can interact with other devices, applications, or services. In other words, everyday objects are increasingly being embedded with hardware capable of sensing, processing, and transmitting data. These objects can then connect to a network and share data with any other application, service, or device. Over time, mobile phones became smartphones. by adding more processing power, more memory, Internet access, Wi-Fi connectivity, and the ability to interconnect with other devices and applications. People thus began to use their mobile phones much differently than before. This shift also changed the way businesses operate. This shift away from "dumb" devices to interconnected smart devices is not lost on businesses. Consumers like smart devices and are willing to pay more for them. Accordingly, businesses want to improve the existing devices they manufacture into smart devices, and then sell them for twice as much. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 4.2: How can new hardware affect competitive strategies? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
44) A(n) ________ is a program that controls a computer's resources. A) cache B) operating system C) central processing unit D) data bus Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 45) Which of the following statements is true of an operating system? A) It does a lot of application-specific work. B) It comes in particular versions that are written for particular types of hardware. C) It does only little or no memory management. D) It has to be the same across all computers in a network in order to process application programs. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 46) ________ are programs that are written to use a particular operating system. A) Web applications B) Thin-client applications C) Native applications D) Vertical-market applications Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
47) Application programs that run within a browser, without the need to be preinstalled on client computers, are referred to as ________. A) thin-client applications B) native applications C) desktop programs D) thick-client applications Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 48) Which of the following statements is true of thick-client applications? A) They are application programs that need not be preinstalled on the client computer. B) They mostly run on a single operating system. C) They do not need a server connection to run. D) They require nothing more than a browser to function. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 49) Which of the following is an open-source operating system? A) Unisys B) Windows C) Linux D) Mac OS Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
50) Which of the following is the most widely used operating system in business? A) Linux B) Windows C) Unix D) Mac OS Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 51) Host operating systems that run one or more operating systems as applications are referred to as ________. A) application programs B) server farms C) server operating systems D) virtual machines Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 52) ________ is the process by which one physical computer hosts many different virtual computers within it. A) Machine coding B) Virtualization C) License sharing D) Cloud computing Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
53) When individuals buy a computer program, they buy a license to ________. A) convert the program into open source software B) modify the features of the program C) use the program D) sell the program Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 54) ________software provides capabilities that are common across all organizations and industries. A) Vertical-market application B) Custom-developed C) Horizontal-market application D) Off-the-shelf with alterations Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 55) McCann Systems, a leading IT firm, develops a customized billing software to meet the needs of its individual customers. In this case, the software developed by the firm is referred to as a(n) ________. A) vertical-market application software B) horizontal-market application software C) open source software D) application simulation software Answer: A AACSB: Application of Knowledge Difficulty: Difficult Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Application
15 Copyright © 2016 Pearson Education, Inc.
56) Which of the following refers to software that is developed for a specific and unique need? A) simulation software B) horizontal-market application software C) one-of-a-kind application software D) open source software Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 57) Which of the following is an advantage of custom-developed software? A) They are less expensive than off-the-shelf software. B) They can be tailored according to an organization's requirements. C) They are easier to develop than using horizontal applications. D) They need not be adapted to changing needs. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 58) ________ is a type of computer software that is installed into devices such as printers, print servers, and various types of communication devices. A) Firmware B) Freeware C) Slate D) Server farm Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 59) Although an operating system does a lot of application-specific work, it does little to make the computer usable. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
60) Both client and server computers must use the same operating system. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 61) Application programs can be processed by both clients and servers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 62) Microsoft Access and Microsoft Word are examples of thin-client applications. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 63) Firefox, Chrome, Opera, and Internet Explorer are examples of thick-client applications. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 64) A virtual machine does not have a disk space. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 65) A host operating system controls the activities of the virtual machines it hosts. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 17 Copyright © 2016 Pearson Education, Inc.
66) Modifying an existing firmware requires knowledge of special programs and techniques. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 67) What is an operating system? How is it different from an application program? Answer: Every computer has an operating system, which is a program that controls that computer's resources. The functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices. Although the operating system makes the computer usable, it does little application-specific work. An application program is any program designed to perform a specific function for a user or for another application program. Both clients and servers can process application programs and the application's design determines whether the client, the server, or both, process it. If one wants to check the weather or access a database, he or she needs application programs such as an iPad weather application or Oracle's customer relationship management (CRM) software. Some application programs are general purpose, such as Microsoft Excel or Word. Other application programs provide specific functions. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 68) What are the two important software constraints? Explain with suitable examples. Answer: First, remember that particular versions of an operating system are written for particular types of hardware. For example, Microsoft Windows works only on processors from Intel and from companies that make processors that conform to the Intel instruction set (i.e., the commands that a CPU can process). With other operating systems, such as Linux, many versions exist for many different instruction sets. Second, be aware that two types of application programs exist: native and Web. Native applications are programs that are written to use a particular operating system, while Web applications run within a computer browser and can therefore run on any type of computer. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
69) Explain the four major nonmobile client operating systems and their functions. Answer: The four major nonmobile client operating systems are Windows, Mac OS, Unix, and Linux. 1. The most popular operating system is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world's desktops, and when considering just business users, the figure is more than 95 percent. The most recent client version of Windows is Windows 8, a major rewrite of prior versions. 2. Apple Computer, Inc. developed its own operating system for the Macintosh, Mac OS. The current version is Mac OS X Mavericks. Macintosh computers are used primarily by graphic artists and workers in the arts community. 3. Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. 4. Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but is by far most popular as a server OS. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 70) What is unique about Linux as an operating system? Answer: Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but usually only when budget is of paramount concern. By far, Linux is most popular as a server OS. According to DistroWatch.com, the five most popular versions of Linux as of 2014 were Linux Mint, Ubuntu, Debian GNU/Linux, Mageia, and Fedora. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
71) What is virtualization? Answer: Virtualization is the process by which one physical computer hosts many different virtual (not literal) computers within it. One operating system, called the host operating system, runs one or more operating systems as applications. Those hosted operating systems are called virtual machines (vm). Each virtual machine has disk space and other resources allocated to it. The host operating system controls the activities of the virtual machines it hosts to prevent them from interfering with one another. With virtualization, each vm is able to operate exactly the same as it would if it were operating in a stand-alone, nonvirtual environment. Three types of virtualization exist: • PC virtualization • Server virtualization • Desktop virtualization AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 72) Explain how computer programs are licensed to individuals and organizations. Answer: When a person buys a computer program, it does not mean actually buying that program. Instead, he is buying a license, which is the right to use that program. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license, which is a flat fee payment for the right to install the product (operating system or application) on all of that company's computers or on all of the computers at a specific site. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
73) What are the different categories of application programs? Answer: Application software consists of programs that perform a service or a function. Some application programs are general purpose. Other application programs provide specific functions. 1. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. 2. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients. Vertical applications usually can be altered or customized. 3. One-of-a-kind application software is developed for a specific, unique need. The U.S. Department of Defense develops such software, for example, because it has needs that no other organization has. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 74) What are the drawbacks of developing custom application software for an organization? Answer: Custom development is difficult and risky. Staffing and managing teams of software developers is challenging. Managing software projects can be daunting. Many organizations have embarked on application development projects only to find that the projects take twice as long, or longer, to finish than planned. Cost overruns of 200 and 300 percent are not uncommon while developing custom application software. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept 75) What is firmware? Answer: Firmware is computer software that is installed into devices such as printers, print servers, and various types of communication devices. The computer software is coded just like other software, but it is installed into special, read-only memory in the printer or other device. In this way, the program becomes part of the device's memory; it is as if the program's logic is designed into the device's circuitry. Users do not need to load firmware into the device's memory. Firmware can be changed or upgraded, but this is normally a task for IS professionals. The task is easy, but it requires knowledge of special programs and techniques that most business users choose not to learn. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.3: What do business professionals need to know about software? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
76) ________ is a computer code that is written by humans and understandable by humans. A) Bar code B) Machine code C) Source code D) Overhead code Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.4: Is open source software a viable alternative? Classification: Concept 77) Open source software is typically free, modifiable, and its source code is publicly available. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.4: Is open source software a viable alternative? Classification: Concept 78) Any programmer or student can access and alter the source code of a closed source project. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.4: Is open source software a viable alternative? Classification: Concept 79) Modifications to the source code of an open source project cannot be added to the project. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.4: Is open source software a viable alternative? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
80) How do open source projects work? How is it different from closed source projects? Answer: The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and that is understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified. In a closed source project, like Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is very well protected. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project's Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, programmers can incorporate open source code into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Open source succeeds because of collaboration. A programmer examines the source code and identifies a need or project that seems interesting. He or she then creates a new feature, redesigns or reprograms an existing feature, or fixes a known problem. That code is then sent to others in the open source project to evaluate the quality and merits of the work and to add it to the product, if appropriate. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 4.4: Is open source software a viable alternative? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 5 Database Processing 1) The purpose of a database is to ________. A) test and troubleshoot newly installed software B) design the source code for computer programs C) describe and build computer architectures D) store lists of data involving multiple themes Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.1: What is the purpose of a database? Classification: Concept 2) Databases are required to keep track of lists with multiple themes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.1: What is the purpose of a database? Classification: Concept 3) In the context of data storage, explain the difference between a spreadsheet and a database. Answer: The purpose of both a spreadsheet and a database is to keep track of things. However, unlike a spreadsheet, a database offers the solution of being able to keep track of more than one type of data. Lists of data involving a single theme can be stored in a spreadsheet. However, lists that involve multiple themes require a database. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.1: What is the purpose of a database? Classification: Concept 4) A ________ is a self-describing collection of integrated records. A) datasheet B) dataflow C) database D) dataspace Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
5) Which of the following best describes a byte in a database? A) It is a character of data. B) It is a group of rows. C) It is a collection of data. D) It is a group of columns. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 6) In a database, bytes are grouped into ________. A) tables B) columns C) rows D) records Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 7) In a database, columns are also called ________. A) records B) tables C) files D) fields Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 8) In a database, rows are also called ________. A) records B) fields C) tables D) files Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
9) In a database, the collection of data for all columns is called a ________. A) record B) field C) file D) table Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 10) In a database, a group of similar rows is called a ________. A) table B) record C) field D) matrix Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 11) In a database, a table is also called a ________. A) record B) matrix C) file D) field Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 12) Which of the following best describes the metadata in a database? A) programs used to create, process, and administer a database B) special data that describes the structure of a database C) data that is stored in a Web site D) special data that is unique to a specific user Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
13) In a database, a column or group of columns that identifies a unique row in a table is known as a ________. A) field B) record C) file D) key Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 14) In a database, columns that are keys of a different table than the one in which they reside are known as ________ keys. A) foreign B) alternate C) relational D) candidate Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 15) Databases that carry their data in the form of tables and represent relationships using foreign keys are called ________ databases. A) hierarchical B) network C) relational D) object Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
16) In a database, a table is formally referred to as a ________. A) matrix B) field C) record D) relation Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 17) Data that describe the data contained in a database are called ________. A) open matrices B) primary data C) metadata D) closed matrices Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 18) A database is a self-describing collection of integrated records. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 19) Bytes, which are characters of data, are grouped into rows in a database. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 20) In a database, columns are also called records. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 5 Copyright © 2016 Pearson Education, Inc.
21) In a database, the collection of data for all columns is called a file. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 22) In a database, a group of similar rows or records is called a table. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 23) In a database, a key is a column or group of columns that identifies a unique row in a table. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 24) Databases that carry their data in the form of tables and that represent relationships using foreign keys are called discrete databases. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 25) The format of the metadata in a database depends on the software product that is processing the database. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
26) To find out what a database contains, one can look at the metadata inside the database. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 27) Describe the elements in a database. Answer: A database is a self-describing collection of integrated records that is organized based on a hierarchy of data elements. A byte is a character of data. Bytes are grouped into columns. Columns are also called fields. A key is a column or group of columns that identifies a unique row in a table. Columns that are keys of a different table than the one in which they reside are called foreign keys. Columns or fields, in turn, are grouped into rows, which are also called records. Finally, a group of similar rows or records is called a table or a file. A database contains, within itself, a description of its contents called metadata. Metadata are data that describe data. Thus, a database is a collection of tables plus relationships among the rows in those tables, plus special data, called metadata, that describes the structure of the database. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 28) What are relational databases? Discuss their drawbacks that led to the development of nonrelational style of database processing. Answer: Databases that carry their data in the form of tables and that represent relationships using foreign keys are called relational databases. Foreign keys are columns that are keys of a different table than the one in which they reside. The relational model was the single, standard way of processing databases for over thirty years. Recently, however, new styles of database processing have started appearing. Part of the reason is that the major principles of the relational model—fixed-sized tables, representing relationships with foreign keys, and the theory of normalization came about because of limited storage space and limited processing speeds back in the 1960s and early 1970s. At some point, maybe the mid-1990s, these limitations were removed by improved storage and processing technology and today they do not exist. In other words, the relational model is not needed today. Other reasons for the development of nonrelational databases include the need to gain faster performance using many servers and to store new types of data such as images, audio, and videos. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
29) Describe the merits of metadata. Answer: A database is self-describing in that it contains, within itself, a description of its contents. This is because it contains not only data, but also data about the data in the database. This data is known as metadata. It is the presence of metadata that makes databases much more useful than spreadsheets or data in other lists. Because of metadata, no one needs to guess, remember, or even record what is in a database. To find out what a database contains, we just look at the metadata inside the database. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.2: What is a database? Classification: Concept 30) A(n) ________ is a program that is used to create, process, and administer a collection of self-describing integrated records. A) decision support system (DSS) B) knowledge management system (KMS) C) database management system (DBMS) D) enterprise planning system (EPS) Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 31) Which of the following is a database management system (DBMS) product from Microsoft? A) MySQL B) SQL Server C) DB2 D) Sybase ASE Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
32) ________ is a popular enterprise database management system (DBMS) product from IBM. A) DB2 B) Access C) SQL Server D) MySQL Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 33) Which of the following is a function of the database management system (DBMS)? A) implementing lean systems in workstations B) eliminating bottlenecks in business processes C) automating workflows in the databases of companies D) processing a database by inserting or modifying data Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Application 34) The database management system (DBMS) provides applications for processing operations such as ________. A) sending and receiving emails B) generating software codes C) inserting or deleting information D) automating business processes Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
35) SQL stands for ________. A) Standard Query Language B) Secondary Query Language C) Structured Query Language D) Simplified Query Language Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 36) ________ is an international standard language that is used for processing a database. A) HyperText Markup Language B) Dynamic HyperText Markup Language C) Structured Query Language D) Sybase language Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 37) One of the important functions of a database management system (DBMS) is to provide the necessary tools for ________. A) encrypting emails B) encapsulating data objects C) administering the database D) testing program codes Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Application
10 Copyright © 2016 Pearson Education, Inc.
38) Which of the following is considered an administrative function of the database management system (DBMS)? A) adding structures to improve the performance of database applications B) testing program codes in the system for errors C) creating tables, relationships, and other structures in databases D) using international standard languages for processing database applications Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 39) Monitoring the performance of a database after providing solutions for improving its performance is an activity of the DBMS pertaining to ________. A) creation B) modification C) processing D) administration Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Application 40) Conducting training to ensure that users and operations personnel know and understand recovery procedures is a task associated with the DBMS ________. A) processing B) administration C) creation D) modification Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 41) Most organizations develop their own database management systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
42) DB2 is a popular database management system product that is licensed from Microsoft. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 43) A database management system is also referred to as a database. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 44) HyperText Markup Language is an international standard language for processing a database. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 45) Structured query language statements can be issued directly to the database management system (DBMS) by an application program. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 46) The database management system (DBMS) can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
47) Database management system (DBMS) administrative functions include adding structures to improve the performance of database applications. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 48) The administrative functions of a database management system (DBMS) include backing up database data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 49) What is a database management system (DBMS)? Explain with suitable examples. Answer: A database management system (DBMS) is a program used to create, process, and administer a database. A DBMS is different from a database in that a DBMS is a software program while a database is a collection of tables, relationships, and metadata. Almost no organization develops its own DBMS. Instead, companies license DBMS products from vendors such as IBM, Microsoft, Oracle, and others. Popular DBMS products are DB2 from IBM, Access and SQL Server from Microsoft, and Oracle Database from the Oracle Corporation. Another popular DBMS is MySQL, an open source DBMS product that is license-free for most applications. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
50) Describe the functions of a database management system (DBMS). Answer: A database management system (DBMS) is a program used to create, process, and administer a database. 1. Database developers use the DBMS to create tables, relationships, and other structures in the database. To create a new table, the developer just fills out a new table's metadata into a form. To modify an existing table—for example, to add a new column—the developer opens the metadata form for that table and adds a new row of metadata. 2. The second function of the DBMS is to process the database. The DBMS provides applications for four processing operations: to read, insert, modify, or delete data. These operations are requested in application calls upon the DBMS. From a form, when the user enters new or changed data, a computer program that processes the form calls the DBMS to make the necessary database changes. From a Web application, a program on the client or on the server application program calls the DBMS directly to make the change. 3. The third DBMS function is to provide tools to assist in the administration of the database. Database administration involves a wide variety of activities. For example, the DBMS can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. In addition to security, DBMS administrative functions include backing up database data, adding structures to improve the performance of database applications, removing data that are no longer wanted or needed and similar tasks. AACSB: Information Technology Difficulty: Difficult Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Application 51) Discuss the creation of a database. Explain its working. Answer: Database developers use the database management system (DBMS) to create tables, relationships, and other structures in the database. A form is used to define a new table or to modify an existing one. To create a new table, the developer just fills the new table's metadata into the form. To modify an existing table, a developer opens the metadata form for that table and adds a new row of metadata. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Application
14 Copyright © 2016 Pearson Education, Inc.
52) Define Structured Query Language (SQL). Answer: Structured Query Language (SQL) is an international standard language for processing a database. DBMS products like DB2 from IBM, Access and SQL Server from Microsoft, and Oracle Database from the Oracle Corporation accept and process SQL statements. Another popular DBMS that accepts SQL statements is MySQL, an open source DBMS product that is license-free for most applications. One need not understand or remember SQL language syntax. Instead, one needs to just realize that SQL is an international standard for processing a database. Also, SQL can be used to create databases and database structures. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.3: What is a database management system (DBMS)? Classification: Concept 53) A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data. A) database application B) metadata table C) database hierarchy D) dimension table Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 54) Which of the following elements of a database application helps in the insertion of new data and the deletion of existing data? A) reports B) application programs C) queries D) forms Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
55) Which of the following elements of a database application presents data in a structured manner using sorting, grouping, filtering, and other operations? A) queries B) forms C) reports D) application programs Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 56) Which of the following elements of a database application provides security, data consistency, and special-purpose processing? A) query applications B) application programs C) reports D) forms Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 57) Traditional database application programs are written in object-oriented languages like ________. A) Pascal B) Visual Basic C) Datalog D) Unigraphics Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
58) Which of the following is true of browser-based database applications? A) They are written in object-oriented languages such as Structured Query Language. B) The application, database management system (DBMS), and the database reside on the user's computer. C) They are displayed and processed using html, html5, or css3. D) They use C++ as the standard language for user-side processing. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Application 59) Browser-based database applications differ from traditional applications in that they ________. A) have no security requirements B) are used only by corporates C) are usually open to the public D) fail to support graphical queries Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 60) Which of the following is a major drawback of multi-user processing of a database? A) lack of data integrity B) software redundancy C) lost-update problem D) limited access to data Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 61) A database application serves as an intermediary between users and database data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
62) Queries in database applications present data in a structured manner using operations such as sorting, grouping, and filtering. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 63) Reports in database applications provide security, data consistency, and special-purpose processing. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 64) All traditional databases require the Internet to transmit traffic between a user's computer and a database management system (DBMS) server computer. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 65) In single-user databases, the application, the database management system (DBMS), and the database all reside on a user's computer. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 66) Traditional database application programs are written in object-oriented languages such as C++. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
67) Browser database application forms, reports, and queries are displayed and processed using HyperText Markup Language (HTML). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 68) Browser applications are thin-client applications that need not be preinstalled on the users' computers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 69) Security requirements are more stringent for traditional applications than for browser-based ones. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 70) The lost-update problem caused by multi-user processing in databases can be prevented by avoiding all types of database locking. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
71) What is a database application? Answer: A database application is a collection of forms, reports, queries, and application programs that serves as an intermediary between users and database data. Database applications reformat database table data to make it more informative and more easily updated. Application programs also have features that provide security, maintain data consistency, and handle special cases. The specific purposes of the four elements of a database application are: Forms - View data; insert new, update existing, and delete existing data. Reports - Structured presentation of data using sorting, grouping, filtering, and other operations. Queries - Search based upon data values provided by the user. Application programs - Provide security, data consistency, and special-purpose processing, e.g., handle out-of-stock situations. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.4: How do database applications make databases more useful? Classification: Concept 72) Which of the following is a drawback of the relational database processing model? A) It utilized an extensive amount of storage space. B) It required powerful processors to function. C) It was never a natural fit with business documents. D) It did not enable document piece-making via normalization. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 73) Which of the following is true of the relational database processing model? A) It supports very high transaction rates. B) It can efficiently store files with large collections of bits. C) It helps organizations store new data types such as images, audio, and videos. D) It represents relationships with the help of foreign keys. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
74) One of the reasons for the appearance of new styles of nonrelational database processing is the need for ________. A) storing data types such as images, audio, and videos in organizations B) gaining faster performance by limiting the number of servers used C) breaking up sales orders via normalization D) limiting the use of open-source document-oriented DBMS Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 75) Which of the following is a nonrelational data store developed by Amazon.com? A) Bigtable B) Dynamo C) Cassandra D) MongoDB Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 76) ________ refers to software products that support very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud. A) NoSQL DBMS B) MySQL DBMS C) Traditional DBMS D) Relational DBMS Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
77) The conversion of the existing traditional databases in organizations to NoSQL databases is ________. A) highly efficient and is being practiced by many organizations B) highly recommended because it is user friendly C) very cost-effective but can be enormously disruptive D) unnecessary when relational databases meet the needs of organizations Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Application 78) MySQL database management system refers to software systems that support very high transaction rates, processing relatively simple data structures, replicated on many servers in the cloud. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 79) NoSQL database management system products are very technical and can be used only by those with a deep background in computer science. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 80) What is a NoSQL database management system? Answer: A few years back, Amazon.com determined that relational database technology wouldn't meet its processing needs, and it developed a nonrelational data store called Dynamo. Google (developed Bigtable) and Facebook (developed Cassandra) also followed suit. Such nonrelational DBMS have come to be called NoSQL DBMS. This term refers to software systems that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud. The rise of NoSQL does mean that, for large organizational IS, choosing a relational DBMS is no longer automatic. NoSQL DBMS products are very technical and can be used only by those with a deep background in computer science. AACSB: Information Technology Difficulty: Difficult Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 5.5: What is a NoSQL DBMS? Classification: Concept 22 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 6 The Cloud 1) Which of the following statements best defines the cloud? A) The cloud is the elastic leasing of pooled computer resources over the Internet. B) The cloud is a peer-to-peer network used to share data between users. C) The cloud is the elastic leasing of in-house computer hardware. D) The cloud is the network of servers hosted in-house by an organization for its own requirements. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 2) What does the term elastic in the definition of the cloud mean? A) It means that the computing resources leased can be increased or decreased dynamically in cloud-based hosting. B) It means that the operations staff manually allots fresh resources when the traffic increases. C) It means that the customers are provided a consistent bandwidth on the cloud. D) It means that the resources available for cloud-hosting are shared among customers. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 3) An organization that hires cloud services ________. A) can accommodate an increase in traffic from only one city B) is allowed to change its computer hardware requirements only once in an hour C) can limit the response time of its Web pages D) is given access only to a single server Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Which of the following statements is true of Web services? A) They are programs designed using the concept of service-oriented architecture. B) They are programs that comply with IEEE 802.3 protocol standard. C) They are programs that comply with Web service standards and can only run as an independent program. D) They are designed in such a way that they cannot be flexibly combined with other programs. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 5) Which of the following statements is true of cloud-based hosting? A) It makes scaling up to meet the demands of increased traffic difficult. B) It involves the risk of investing in technology that may soon become obsolete. C) It gives greater control over physical location of data. D) It gives little visibility over the security being used to protect data. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 6) Which of the following is an advantage of in-house hosting? A) It requires very small capital. B) It gives greater control over the location of data. C) It has the ability to adapt to growing or fluctuating demands. D) It eliminates the risk of obsolescence. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Which of the following factors has contributed to an increase in the popularity of cloud hosting? A) demand for services that can run without the support of the Internet B) development of virtualization technology that allows near-instantaneous creation of new virtual machines C) development of Web services that can be accessed without meeting the service-oriented architecture specifications D) increase in the cost of processors, data communication, and data storage Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 8) Cloud resources are pooled because many different organizations use the same physical hardware. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 9) Cloud vendors do not benefit from economies of scale. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 10) Service oriented architecture (SOA) is a way of designing computer programs so that they can be combined flexibly. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) As standard practice, customers are regularly updated by cloud vendors about the location and number of copies made of their data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 12) To use cloud-based hosting, an organization will have to construct its own data center. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 13) Before the creation of personal computers, time-sharing vendors provided slices of computer time on a use-fee basis. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 14) Cloud-based hosting is preferred by organizations that are required by law to have physical control over their data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 15) Organizations that are required by law to have physical control over their data can benefit from cloud computing using private clouds and virtual private clouds. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
16) Why is the term elastic used to describe the cloud? Answer: The term elastic means that the computing resources leased can be increased or decreased dynamically, programmatically, in a short span of time, and that organizations pay for just the resources that they use. If the traffic for a Web site hosted on the cloud increases, servers can be increased dynamically to restrict the response time of the Web site. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 17) Why is the term pooled used to describe the cloud? Answer: Cloud resources are pooled because many different organizations use the same physical hardware, which they share through virtualization. Cloud vendors dynamically allocate virtual machines to physical hardware as customer needs increase or decrease. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 18) Why is cloud hosting preferred to in-house hosting? Answer: Cloud hosting allows the number of servers being rented to be increased easily. This means any number of customers can access the Web site hosted on the cloud and have the same response time. Large, reputable organizations provide best-of-breed security and disaster recovery. Clients do not have to take the risk of investing in technology that may soon become obsolete; the cloud vendor takes that risk. For these reasons, cloud hosting is preferred to inhouse hosting. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 19) What are the disadvantages of cloud-based hosting? Answer: The negatives of cloud computing involve loss of control. Users are dependent on a vendor; changes in the vendor's management, policy, and prices are beyond their control. Further, users don't know where their data, which may be a large part of their organization's value, is located. Nor do the users know how many copies of their data there are or even if they are located in the same country as they are. Finally, users have no visibility into the security and disaster preparedness that is actually in place. Their competitors could be stealing their data and they would not know it. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 5 Copyright © 2016 Pearson Education, Inc.
20) What are the factors that have made cloud-based hosting advantageous? Answer: Three factors have made cloud-based hosting advantageous today. First, processors, data communication, and data storage are so cheap that they are nearly free. At the scale of a Web farm of hundreds of thousands of processors, providing a virtual machine for an hour costs essentially nothing. Because data communication is so cheap, getting the data to and from that processor is also nearly free. Second, virtualization technology enables the near instantaneous creation of a new virtual machine. The customer provides (or creates in the cloud) a disk image of the data and programs of the machine it wants to provision. Virtualization software does the rest. Finally, Internet-based standards enable cloud-hosting vendors to provide processing capabilities in flexible, yet standardized, ways. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 21) Explain why cloud-based hosting does not make sense for some organizations. Answer: The only organizations for which cloud hosting may not make sense are those that are required by law or by industry standard practice to have physical control over their data. Such organizations might be forced to create and maintain their own hosting infrastructure. A financial institution, for example, might be legally required to maintain physical control over its data. Even in this circumstance, however, it is possible to gain many of the benefits of cloud computing using private clouds and virtual private clouds. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.1: Why is the cloud the future for most organizations? Classification: Concept 22) Phobas Inc. offers an online service that stores notes made by customers on the cloud. When a customer enters notes on a device, it gets updated in all the devices he/she owns. Which of the following cloud-based offerings does Phobas Inc. provide to its customers? A) unified communications as a service (UCaaS) B) platform as a service (PaaS) C) software as a service (SaaS) D) infrastructure as a service (IaaS) Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Application
6 Copyright © 2016 Pearson Education, Inc.
23) An online service provider provides its users with hosted computers, an operating system, and a database management system (DBMS). This allows customers to add their own applications to the hosted services. Which of the following cloud-based offerings is being provided to the users? A) unified communications as a service (UCaaS) B) platform as a service (PaaS) C) infrastructure as a service (IaaS) D) software as a service (SaaS) Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Application 24) The cloud-based service that provides the hardware and allows customers to load an operating system of their choice is known as ________. A) application virtualization B) platform as a service (PaaS) C) infrastructure as a service (IaaS) D) network functions virtualization (NFV) Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 25) A ________ is an information system that stores user data in many different geographical locations and makes that data available on demand. A) virtual private network B) content delivery network C) wide area network D) local area network Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) Which of the following is an advantage of a content delivery network? A) It increases the load time of Web pages for the users. B) It provides protection from denial-of-service (DOS) attacks. C) It increases the reliability by storing the data on a single, large server. D) It increases the load on the original server. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 27) Which of the following statements is true of content delivery networks (CDNs)? A) They reduce access costs by delivering data faster. B) They distribute data on different servers without any data replication. C) They use geographic proximity as the factor to decide which server should deliver a requested content. D) They use predetermined servers to deliver content to each location irrespective of traffic changes. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 28) An internal information system built using Web services is said to be using the cloud if it ________. A) allocates specific servers to each task B) offers elasticity in the usage of servers C) uses the Intranet D) provides platform as a service (PaaS) Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) Which of the following is a reason for an internal information system that uses Web services to not be considered a cloud? A) The number of servers is fixed and is not made elastic. B) Idle servers are dynamically re-allocated. C) Data transfer is enabled without dependency on the Internet. D) Web service standards are not followed, as they are confined within the limits of a company. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 30) Organizations can dynamically reuse servers that use Web services internally by ________. A) creating a private cloud B) replicating the servers C) allocating different servers for different services D) making the servers elastic Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 31) To use software as a service (SaaS), a user has to just sign up for the service and learn how to use it. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 32) A content delivery network (CDN) provides a specialized type of platform as a service (PaaS). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
33) A content delivery network (CDN) services a user's request using the geographically closest server. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 34) Content delivery networks (CDNs) increase a Web page's load time. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 35) A routing server determines which content delivery network (CDN) server should respond to a request in real time. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 36) Content delivery networks (CDNs) are used to store and deliver content that rarely changes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 37) A user can receive various pieces of a Web page from different servers on a content delivery network (CDN). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) An elastic load balancer is a feature available in a private cloud that is not available in internal information systems, built using Web services. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 39) An organization's internal information system that does not provide elasticity is still considered a cloud. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 40) Explain how software as a service (SaaS) works. Answer: Software as a service (SaaS) is a category of cloud-based service offering. An organization that provides SaaS provides not only hardware infrastructure, but also an operating system and application programs as well. Apple's iCloud is an example of SaaS. Apple uses it to sync all of its customers' iOS devices. When a customer enters an appointment in her iPhone, Apple automatically pushes that appointment into the calendars on all of that customer's iOS devices. Further, customers can share calendars with others that will be synchronized as well. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 41) Explain with an example how platform as a service (PaaS) works. Answer: Platform as a service (PaaS) is a category of cloud hosting in which vendors provide hosted computers, an operating system, and possibly a database management system (DBMS). Microsoft Windows Azure, for example, provides servers installed with Windows Server. Customers of Windows Azure then add their own applications on top of the hosted platform. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) Explain how a content delivery network ensures fast delivery of data on demand. Answer: A content delivery network (CDN) is a system of hardware and software that stores user data in many different geographical locations and makes that data available on demand. An organization can use CDN to store copies of its Web pages or other information. The CDN vendor replicates this information on servers, possibly worldwide, so as to minimize latency. When a user demands this information, a routing server determines which CDN server is likely to service a request the fastest. Because traffic changes rapidly, especially for popular sites, such calculations are made in real-time. A request for content at one moment in time could be served by a computer in, say, San Diego, and a few moments later, that same request from that same user might be served by a computer in Salt Lake City. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 43) What are the advantages of building an internal information system using Web services? Answer: Organizations can use Web services to build internal information systems that can be accessed by multiple applications. By doing so, internal applications can use these Web services like building blocks. They can use the services that they need–and no more. Because the Web services are encapsulated, the system can be altered without affecting other applications. In this way, systems development is more flexible, and it will be faster and hence less costly. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.2: How do organizations use the cloud? Classification: Concept 44) Sireus Corp. has availed a cloud-based service. As this service provides hardware and operating systems, Sireus Corp. can easily install its software on this cloud product. Which of the following services has the company availed from its cloud vendor? A) unified communications as a service (UCaaS) B) infrastructure as a service (IaaS) C) platform as a service (PaaS) D) software as a service (SaaS) Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Application
12 Copyright © 2016 Pearson Education, Inc.
45) If an organization opts for software as a service (SaaS), it will have to ________. A) install an operating system on the server B) purchase licenses for software replication C) transfer data and develop procedures D) install a database management system Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Concept 46) A vendor providing software as a service (SaaS) usually makes the software available as a thin-client. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Concept 47) If software licensed from others is to be installed on the cloud, licenses that permit replication must be purchased. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Concept 48) Database management system (DBMS) products are included in infrastructure as a service (IaaS). Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Concept 49) A small company is likely to choose infrastructure as a service (IaaS) as it does not require much technical expertise to load operating systems on a server. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.3: How can AllRoad Parts use the cloud? Classification: Concept 13 Copyright © 2016 Pearson Education, Inc.
50) What is a virtual private network? A) It is a markup language that fixes several HyperText Markup Language (HTML) deficiencies and is commonly used for program-to-program interaction over the Web. B) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. C) It is the most common language for defining the structure and layout of Web pages. D) It is a connection that uses the Internet to create secure point-to-point connections. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 51) Which of the following is true of a virtual private network (VPN)? A) It provides a secure connection for information transmitted over the public Internet. B) It does not encrypt messages. C) It is confined to be used within an organization. D) It can be used to store highly sensitive information of an organization. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 52) Which of the following is an advantage of a virtual private network (VPN)? A) It can be used to physically connect a client and the server. B) It helps to securely access information over the public Internet. C) It facilitates easy access to an organization's data without requiring security access. D) It does not depend on the Internet to function effectively. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
53) Which of the following statements is true of private clouds? A) Private clouds are easy to build and operate. B) Several organizations pool their resources to form a private cloud. C) Private clouds provide access from outside an organization that it created without requiring a person to connect to a virtual private network. D) Idle servers in a private cloud cannot be repurposed for use by other organizations. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 54) Which of the following is an advantage of a private cloud in an organization? A) It reduces the complexity involved in using other publicly available cloud services. B) It eliminates the need to use an additional secure network to access this cloud from outside the organization. C) It allows the organization to repurpose its idle servers for use to other organizations. D) It allows the organization to manage its servers with elastic load balancing. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 55) Which of the following statements is true of a virtual private cloud (VPC)? A) A VPC does not make use of a virtual private network. B) A VPC generally stores an organization's most sensitive data. C) A VPC can be accessed only from within an organization. D) A VPC can be built on a public cloud infrastructure. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
56) Which of the following is a difference between a virtual private network (VPN) and a virtual private cloud (VPC)? A) A VPC uses encrypted connections between the users and its server, while a VPN does not use such secure connections. B) A VPC can be accessed over the Internet, while a VPN cannot be accessed over the Internet. C) A VPC does not facilitate data storage, while a VPN allows the storage of a user's most important data. D) A VPC provides the advantages of cloud storage, but a VPN by itself cannot provide these advantages. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 57) Which of the following is an advantage of using a private cloud over a virtual private cloud (VPC)? A) Unlike a VPC, the infrastructure required for a private cloud can be built and operated easily. B) Unlike a VPC, a private cloud can be created and used without the Internet. C) Unlike a VPC, a private cloud can be built on top of a public cloud infrastructure. D) Unlike a VPC, a private cloud does not require permission from regulating bodies to host sensitive data. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 58) A tunnel is a virtual, private pathway over a public or shared network from the virtual private network (VPN) client to the VPN server. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 59) A virtual private network uses the Internet to create the appearance of private, secure connections. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 16 Copyright © 2016 Pearson Education, Inc.
60) A virtual private network (VPN) uses encryption and decryption to protect VPN communications from snooping. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 61) A virtual private cloud allows organizations to gain the advantages of cloud storage for the portion of data that need not be physically controlled. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 62) Explain how a user in a hotel in Los Angeles can connect to a local area network (LAN) at a Michigan site using a virtual private network? Answer: A virtual private network (VPN) uses the Internet to create the appearance of private, secure connections. The remote user is the VPN client. That client first establishes a public connection to the Internet. The connection can be obtained by accessing a local ISP or by using a direct Internet connection. Once the Internet connection is made, VPN software on the remote user's computer establishes a connection with the VPN server in Michigan. The VPN client and VPN server then have a secure connection. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 63) How are communications secured from snooping in a virtual private network? Answer: To secure virtual private network (VPN) communications over the public Internet, the VPN client software encrypts, or codes, messages so their contents are protected from snooping. Then the VPN client appends the Internet address of the VPN server to the message and sends that package over the Internet to the VPN server. When the VPN server receives the message, it strips its address off the front of the message, decrypts the coded message, and sends the plain text message to the original address inside the LAN. In this way, secure private messages are delivered over the public Internet. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
64) What is a private cloud? What are its limitations? Answer: A private cloud is a cloud that is owned and operated by an organization for its own benefit. Private clouds provide the advantages of elasticity, but to a questionable benefit. Organizations cannot repurpose their idle servers for use by other companies. Even a large conglomerate or major international company that uses the idle servers to balance processing loads across subsidiary business units and across different geographical regions is unlikely to save money or time. It is unimaginable that any noncloud company could build and operate a cloud service facility that competes with those provided by the existing large cloud vendors. Also, most organizations choose not to replicate database servers because of the complexity of managing multiple database servers. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 65) What is a virtual private cloud? What are its advantages? Answer: A virtual private cloud (VPC) is a subset of a public cloud that has highly restricted, secure access. An organization can build its own VPC on top of public cloud infrastructure. Using a VPC, an organization can store its most sensitive data on its own infrastructure, and store the less sensitive data on the VPC. In this way, organizations that are required to have physical control over some of their data can place that data on their own servers and locate the rest of their data on the VPC. This is a feature that is not available in a private cloud. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.4: How can organizations use cloud services securely? Classification: Concept 66) Which of the following is likely to be a consequence of cloud computing in the future? A) The preference to set up one's own computing infrastructure will increase among organizations. B) The cost of obtaining elastic resources will decrease. C) The demand for employees who know how to use and manage information systems will reduce. D) The number of technology-based startups will stagnate. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
67) A(n) ________ is an information system (IS) that provides computer-based activity at a distance. A) transport driver interface B) content delivery network C) indexing service system D) remote action system Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 68) A remote system designed by Alpha Solutions uses cameras and motion-sensing equipment to issue tickets for traffic violations. This system is an example of ________. A) telediagnosis B) teleassessment C) telelaw enforcement D) teleinstruction Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 69) Large Web farms are likely to replace in-house servers used by small companies due to the benefits of cloud computing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 70) Cloud computing can enable organizations to readily obtain elastic resources at very low costs. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
71) Cloud computing is likely to lead to an increase in the number of technology-based startups. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 72) Telediagnosis uses telecommunications to link surgeons to robotic equipment at distant locations. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 73) Teleaction increases the value of local mediocrity. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept 74) Remote action systems increase time and travel expenses. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 6.5: What does the cloud mean for your future? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 7 Organizations and Information Systems 1) Which of the following statements is true of personal information systems? A) Personal information systems that support a particular department are called workgroup information systems. B) Adapting to changes in personal information systems is extremely difficult and time consuming. C) Personal information systems have a single user only, and so the procedures are probably not documented or formalized. D) The solutions to problems in a personal information system usually involve more than one department. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 2) Personal information systems are most likely to be used by ________. A) physician partnerships B) drug salespersons C) PRIDE systems D) hospitals Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 3) Which of the following is a characteristic of workgroup information systems? A) isolated problems B) informal procedures C) resistance to change D) affects multiple organizations Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Physician partnerships most likely use ________. A) inter-enterprise information systems B) workgroup information systems C) enterprise information systems D) departmental information systems Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 5) Which of the following statements is true of workgroup information systems? A) Workgroup information systems that support a particular department are called enterprise information systems. B) Workgroup information systems that support a particular business function are called personal information systems. C) The users of workgroup information systems are defined by levels of security authorization. D) Workgroup information systems that support a particular department are sometimes called departmental information systems. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 6) Which of the following is a characteristic of enterprise information systems? A) They do not document procedures as the procedures are simple and informal. B) They are shared between two or among more independent organizations. C) They typically have hundreds to thousands of users. D) They are limited to a single department in an organization. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Which of the following statements is true of enterprise information systems? A) They are information systems that are shared by two or more independent organizations. B) The solutions to problems in these systems usually involve more than one department. C) They typically support less than 100 users. D) They are called personal information systems if they support a particular business function. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 8) ________ are systems that are shared by two or more independent organizations. A) Inter-enterprise information systems B) Workgroup information systems C) Enterprise information systems D) Personal information systems Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 9) Which of the following is most likely to make use of an inter-enterprise information system? A) hospitals B) drug salespersons C) PRIDE systems D) physician partnerships Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 10) Functional information systems are information systems used by a single individual. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Workgroup information systems that support a particular department are called personal information systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 12) The contact manager in an email account is an example of a personal information system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 13) Personal information systems generally support around 10 users. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 14) Enterprise information systems have procedures that are formalized and extensively documented. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 15) Enterprise information systems are information systems that span an organization and support activities of people in multiple departments. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
16) Enterprise information systems are information systems that are shared by two or more independent organizations. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 17) The solutions to problems in an enterprise system usually involve more than one enterprise. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 18) In the case of workgroup information systems, problems are resolved by contract and litigation. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 19) Inter-enterprise information systems are information systems that are shared by two or more independent departments within an organization. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 20) Information silos help in resolving any problem that may arise due to isolated information systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
21) What are personal information systems? Answer: Personal information systems are information systems used by a single individual. The contact manager in an iPhone or in an email account is an example of a personal information system. Because such systems have only one user, procedures are simple and are generally not documented or formalized in any way. It is easy to manage change to personal information systems because only one person needs to adapt to the change. And, if there are problems, individual users can solve the problems themselves. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 22) Explain workgroup information systems. Answer: A workgroup information system is an information system that is shared by a group of people for a particular purpose. For example, at a physicians' partnership, doctors, nurses, and staff use information systems to manage patient appointments, keep patient records, schedule inoffice procedures and equipment, and facilitate other workgroup activities. Workgroup information systems that support a particular department are sometimes called departmental information systems. An example is the accounts payable system that is used by the accounts payable department. Other workgroup information systems support a particular business function and are called functional information systems. An example of a functional system is a Web storefront. Typically workgroup systems support 10 to 100 users. The procedures for using them must be understood by all members of the group. Often, procedures are formalized in documentation, and users are sometimes trained in the use of those procedures. When problems occur, they almost always can be solved within the group. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
23) What are enterprise information systems? Answer: Enterprise information systems are information systems that span an organization and support activities in multiple departments. For example, at a hospital, doctors, nurses, the pharmacy, the kitchen, and others use information systems to track patients, treatments, medications, diets, room assignments, and so forth. Enterprise information systems typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users undergo formal procedure training. Sometimes enterprise systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by levels of security authorization. The solutions to problems in an enterprise system usually involve more than one department. Because enterprise systems span many departments and involve potentially thousands of users, they are very difficult to change. Changes must be carefully planned, cautiously implemented, and users given considerable training. Sometimes users are given incentives and other inducements to motivate them to change. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 24) Explain inter-enterprise information systems. Answer: Inter-enterprise information systems are information systems that are shared by two or more independent organizations. Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned, organizations. Problems are resolved by meeting, contract, and sometimes by litigation. Because of the wide span, complexity, and multiple companies involved, such systems can be exceedingly difficult to change. The interaction of independently owned and operated information systems is required. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.1: How do information systems vary by scope? Classification: Concept 25) A(n) ________ exists when data are isolated in separated information systems. A) walled garden B) information silo C) mashup D) viral hook Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) Information silos arise as a result of ________. A) data integration across several information systems within an organization B) the sharing of an inter-enterprise information system with several organizations C) too many users depending on a single enterprise-wide information system D) data being isolated in systems that are separated across different organizational levels Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 27) Which of the following is an information systems application that supports the sales and marketing department in an organization? A) HR planning B) inventory management C) lead tracking D) recruiting Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 28) Which of the following departments in an organization is supported by information systems applications such as recruitment and compensation? A) accounting department B) operations department C) human resources department D) customer service department Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) Cost accounting and financial reporting are information systems applications that support an organization's ________. A) manufacturing department B) human resources department C) accounting department D) customer service department Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 30) Customer management and lead generation are information systems applications that support an organization's ________. A) accounting department B) human resources department C) sales and marketing department D) customer service department Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 31) ________ is an information systems application that supports the human resources department in an organization. A) Assessment B) Budgeting C) Customer management D) Cash management Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
32) Which of the following is a problem posed by information silos? A) Data cannot be duplicated. B) A lot of file space is wasted. C) The interdependence between various information systems applications increases. D) There is a lack of integrated enterprise information. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 33) The problems posed by information silos ultimately lead to ________. A) diseconomies of scope B) increased costs for an organization C) diminishing marginal returns D) reduced organizational innovation Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 34) ________ is the activity of altering the existing business processes and designing new ones to take advantage of new information systems. A) Business process management B) Business process reengineering C) Business process outsourcing D) Business process interoperability Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
35) Which of the following statements is true of business process reengineering? A) It is a very fast process and is easy to carry out. B) When combined with enterprise resource planning (ERP), it has 100 percent success rate. C) It is a very expensive process. D) Due to its streamlined processes, it requires no expertise. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 36) Information silos arise when entities at one organizational level in a company create information systems that meet only their particular needs. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 37) The major issue caused by information silos is wasted file space. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 38) When an organization has inconsistent duplicated data, it is said to have a data integrity problem. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 39) Data inconsistency is a major problem caused by information silos at the department level. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
40) Enterprise application integration (EAI) refers to the activity of altering existing business processes and designing new ones to take advantage of new information systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 41) Business process reengineering is extremely fast and economical. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 42) What are information silos? Answer: Information silos are the conditions that exist when data are isolated in separated information systems. Silos come into existence as entities at one organizational level create information systems that meet only their particular needs. The major problems caused by information silos at department level include data duplication and data inconsistency, disjointed processes, limited information and lack of integrated information, isolated decisions leading to organizational inefficiencies, and increased expenses for a company. When an organization has inconsistent duplicated data, it is said to have a data integrity problem. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 43) What are the problems caused by information silos? Answer: As organizations grow, information silos will eventually lead to duplication of data and cause potentially serious problems. First, data are duplicated because each application has its own database. Next, when applications are isolated, business processes are disjointed. A consequence of such disjointed systems is the lack of integrated enterprise information. This leads to the fourth consequence: inefficiency. When using isolated functional applications, decisions are made in isolation. Without integration, the left hand of the organization doesn't know what the right hand of the organization is doing. Finally, information silos can result in increased cost for the organization. Duplicated data, disjointed systems, limited information, and inefficiencies all mean higher costs. AACSB: Information Technology Difficulty: Difficult Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 12 Copyright © 2016 Pearson Education, Inc.
44) How can organizations solve the problems caused by information silos? Answer: An information silo occurs when data is stored in isolated systems. The obvious way to fix such a silo is to integrate the data into a single database and revise applications and business processes to use that database. If that is not possible or practical, another remedy is to allow the isolation, but to manage it to avoid problems. Isolated data created by workgroup information systems can be integrated using enterprise-wide applications. Isolated data created by information systems at the enterprise level can be integrated into inter-enterprise systems using distributed applications that process data in a single cloud database or that connect disparate, independent databases so that applications can process those databases as if they were one database. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 45) What is business process reengineering? Answer: Business process reengineering is the activity of altering existing and designing new business processes to take advantage of new information systems. Unfortunately, business process reengineering is difficult, slow, and exceedingly expensive. Systems analysts need to interview key personnel throughout the organization to determine how best to use the new technology. Because of the complexity involved, such projects require high-level and expensive skills and considerable time. Many early projects stalled when the enormity of the project became apparent. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.2: How do enterprise systems solve the problems of departmental silos? Classification: Concept 46) Inherent processes are ________. A) time-consuming business processes that involve substantial investment B) predesigned procedures for using software products C) the set of procedures that help companies implement business process reengineering D) business process reengineering techniques with low success rates Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
47) Which of the following statements is true of inherent processes? A) Inherent processes are almost always a perfect fit. B) Organizations cannot license the software used in inherent processes. C) Inherent processes are expensive and time-consuming. D) Inherent processes provide an alternative to business process reengineering. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 48) The first phase in the customer life cycle involves ________. A) sending messages to target audiences to attract customer prospects B) attempting to win back high-value customers C) converting prospects into customers who need to be supported D) increasing the value of existing customers by selling more products to them Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 49) During the ________ phase of the customer life cycle, prospects become customers who need to be supported by the organization. A) customer engagement B) marketing C) customer acquisition D) relationship management Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
50) Which of the following is a component of relationship management? A) converting prospects into customers who need to be supported B) increasing the value of existing customers by selling them more products C) positioning products in the minds of customers through promotional strategies D) sending messages to target audiences to attract customer prospects Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 51) During which of the following phases of the customer life cycle do win-back processes categorize customers according to value? A) customer acquisition B) marketing C) relationship management D) churn Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 52) ________ is the last phase in the customer life cycle. A) Marketing B) Customer acquisition C) Churn D) Relationship management Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
53) Which of the following statements is true of customer relationship management (CRM) systems? A) They are applications used for consolidating business operations into a single, consistent, computing platform. B) They vary in the degree of functionality they provide. C) They incorporate accounting, manufacturing, inventory, and human resources applications. D) A major disadvantage of these systems is a lack of consistency in data. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 54) Enterprise resource planning (ERP) helps in ________. A) consolidating business operations into a single, consistent computing platform B) managing all the interactions with customers C) providing layers of software that connect applications together D) connecting several enterprises within the same industry Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 55) Which of the following statements is true of enterprise resource planning (ERP)? A) ERP is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. B) The two major components of ERP systems are manufacturing applications and inventory applications. C) ERP is also referred to as enterprise application integration (EAI) due to its highly efficient integration properties. D) ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
56) ________ is the worldwide leader of enterprise resource planning (ERP) vendors. A) TQM B) EAI C) SCM D) SAP Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 57) Enterprise resource planning (ERP) was originally used in the ________ domain. A) accounting B) customer support C) manufacturing D) human resources Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 58) ________ is a suite of software applications that consolidates existing systems by providing layers of software that connect applications together. A) Enterprise resource planning (ERP) system B) Enterprise application integration (EAI) C) Customer relationship management (CRM) system D) Rich internet application (RIA) Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
59) Which of the following is a function of enterprise application integration (EAI)? A) It is used to forecast sales and to create manufacturing plans to meet those forecasts. B) It manages all the interactions with customers, from lead generation to customer service. C) It creates information silos by departmentalizing applications. D) It enables existing applications to communicate and share data. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 60) Which of the following statements is true of enterprise application integration (EAI)? A) A disadvantage of the EAI software is the lack of metadata files that describe where data are located. B) The layers of EAI software prevent existing applications from communicating with each other. C) EAI makes use of a centralized database that acts as a "virtual integrated database" for users to process. D) EAI software can be configured to automatically make conversions needed to share data among different systems. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 61) The expenses and risks associated with the implementation or upgrading of enterprise systems arise from the ________. A) need for encrypting a company's data before an enterprise system can use the data B) lack of resources within a company to handle the implementation of the system C) lack of variety in the enterprise systems currently being sold in the market D) resistance from a company's employees to changes in existing systems Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
62) When implementing new enterprise systems in a company, process issues that may arise can be effectively resolved by ________. A) encouraging entities at different organizational levels to create separate information systems B) developing committees and steering groups for process management C) bringing conciliators or arbitrators into the company to sort the issues D) giving the responsibility of resolving issues to the company's CEO Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 63) ________ is a major issue faced by companies when implementing enterprise systems. A) The failure of applications to communicate and share data with each other B) The failure to incorporate accounting and human resource applications C) The lack of a centralized database where important data such as metadata can be stored D) The gap between the requirements of an organization and the capabilities of an application Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 64) ________ is a person's belief that he or she can be successful at his or her job. A) Extroversion B) Conscientiousness C) Self-actualization D) Self-efficacy Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
65) Inter-enterprise PRIDE systems are referred to as ________ because in such systems processing is divided across multiple computing devices. A) distributed systems B) departmental information systems C) business intelligence systems D) integrated systems Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 66) Inherent processes save organizations from expensive and time-consuming business process reengineering. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 67) The second phase of the customer life cycle is customer acquisition. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 68) The last phase of the customer life cycle is relationship management. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 69) Every contact and transaction with a customer is recorded in the CRM database. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
70) Enterprise resource planning (ERP) incorporates accounting, manufacturing, inventory, and human resources applications. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 71) Enterprise application integration (EAI) is used to forecast sales and create manufacturing plans to meet those forecasts. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 72) SAP offers industry-specific packages that customize its product for particular uses. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 73) Enterprise application integration (EAI) connects system "islands" via a new layer of software. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 74) Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
75) The work of committees and steering groups developed for providing process management is slow and expensive. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 76) Most organizations today create their own enterprise systems from scratch. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 77) Transitioning from one enterprise system to a new enterprise system is fairly easy due to the integrated steps involved in the process. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 78) Implementing new enterprise systems can improve efficiency of an organization. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 79) One of the reasons why people fear change is because it threatens their self-efficacies. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
80) Describe customer relationship management (CRM) system. Answer: A CRM system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Every contact and transaction with the customer is recorded in the CRM database. Vendors of CRM software claim using their products makes the organization customer-centric. A CRM database includes solicitation and lead management application, sales application, relationship management application, and customer support application. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 81) Explain the four phases of the customer life cycle. Answer: The four phases of the customer life cycle are marketing, customer acquisition, relationship management, and loss/churn. Marketing sends messages to the target market to attract customer prospects. When prospects order, they become customers who need to be supported. Additionally, relationship management processes increase the value of existing customers by selling them more products. Inevitably, over time the organization loses customers. When this occurs, win-back processes categorize customers according to value and attempt to win back high-value customers. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 82) What is enterprise resource planning (ERP)? Answer: ERP is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. ERP includes the functions of CRM and also incorporates accounting, manufacturing, inventory, and human resources applications. ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. Manufacturing schedules include the use of material, equipment, and personnel and thus need to incorporate inventory and human resources applications. Because ERP includes accounting, all of these activities are automatically posted in the general ledger and other accounting applications. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
83) What are some of the benefits of enterprise application integration (EAI)? Answer: EAI is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. Although there is no centralized EAI database, EAI software keeps files of metadata that describe where data are located. Users can access the EAI system to find the data they need. In some cases, the EAI system provides services that supply a "virtual integrated database" for the user to process. The major benefit of EAI is that it enables organizations to use existing applications while eliminating many of the serious problems of isolated systems. Converting to an EAI system is not nearly as disruptive as converting to enterprise resource planning (ERP). It also provides many of the benefits of ERP. Some organizations develop EAI applications as a stepping stone to complete ERP systems. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 7.3: How do CRM, ERP, and EAI support enterprise systems? Classification: Concept 84) Standards such as http, https, html5, css3, JavaScript, and Web services enable programs on varied and disparate devices to flexibly communicate with the cloud servers and database and indirectly communicate with each other. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 7.4: How do inter-enterprise IS solve the problems of enterprise silos? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 8 Social Media Information Systems 1) ________ is the use of information technology to support the sharing of content among networks of users. A) Electronic data interchange B) Data warehousing C) Cloud computing D) Social media Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 2) Which of the following statements is a characteristic of social media (SM) user communities? A) SM user communities are mostly based on geographic and familial ties. B) Most users of SM belong to several different user communities. C) In community SM site relationships, the relationships in second-tier communities are disassociated from first-tier users. D) A viral hook is an inducement to constrain communications between user communities. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 3) Social media (SM) communities differ from regular communities because ________. A) they are based on mutual interests of users B) they are based only on organizational boundaries C) most people belong to a single community D) the total number of its users is determined by the sum of the sizes of all its communities Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Platforms that enable the creation of social networks, or social relationships among people with common interests, are offered by social media ________. A) users B) sponsors C) providers D) communities Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 5) Social media (SM) ________ utilize SM sites to build social relationships. A) outlets B) users C) providers D) newsrooms Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 6) Social media (SM) ________ are formed based on mutual interests and transcend familial, geographic, and organizational boundaries. A) communities B) collaborators C) dashboards D) outlets Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Which of the following statements is true about viral hooks in a social media (SM) site? A) It is used to restrain information leaks from an organization. B) It is used to enhance an organization's privacy on its SM sites. C) It is designed to root out users who post junk content on an organization's SM site. D) It is an inducement to pass communication along the tiers of a community. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 8) Which of the following statements is a feature of social media (SM) providers? A) They do not support custom software for long durations as it is expensive. B) They generally charge users a license fee to use their applications. C) They use elastic, cloud-based servers to host SM presence. D) They sponsor content on SM sites. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 9) ________ refers to data and responses to data that are contributed by users and SM sponsors. A) Connection data B) Capital data C) Content data D) Custom data Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 10) ________ is data about relationships. A) Connection data B) Capital data C) Content data D) Communication data Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
11) A Facebook user likes pages of various organizations on Facebook. The fact that the user has liked a particular organization is an example of ________. A) content data B) user response C) data contribution D) connection data Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Application 12) In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) providers? A) They usually process SM sites using desktops, laptops, and smartphones. B) They store and retrieve SM data on behalf of users. C) They employ browsers and native mobile applications to store and retrieve connection data. D) They are informal, evolving, and socially oriented. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 13) In the context of the five components of social media information systems (SMIS), which of the following statements is true of social media (SM) procedures? A) They process SM sites using elastic, cloud-based servers. B) Organizations develop and operate their own custom, proprietary, social networking application software. C) Informality makes SMIS difficult to use. D) They are informal, evolving, and socially oriented. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
14) Social media enables people to form communities, which are groups of people related by a common interest. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 15) A social media information system is an information system that supports the sharing of content among networks of users. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 16) Social media communities develop and operate their own custom, proprietary, social networking application software. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 17) Social media communities are the companies that operate social media (SM) sites. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 18) Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest are examples of social media providers that enable the creation of social networks. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
19) Social media providers create the features and functions of the site, and they compete with one another for the attention of users. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 20) Social media users include only individuals and not organizations that use social media sites. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 21) Organizations create and manage social media (SM) accounts just like typical users. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 22) Some companies hire staff to maintain their social media (SM) presence, promote their products, build relationships, and manage their image. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 23) Depending on how an organization wants to use social media, it can be a user, a provider, or both. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
24) Social media providers develop and operate their own custom, proprietary, social networking application software. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 25) Content data is data about relationships. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 26) Connection data differentiates social media information systems (SMIS) from Web site applications. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 27) Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 28) Social media (SM) application providers store and retrieve SM data on behalf of users. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
29) For social networking users, procedures are informal, evolving, and socially oriented. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 30) Informality in procedures means that unintended consequences are common in social media. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 31) Social media is creating new job titles, new responsibilities, and the need for new types of training. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 32) What is social media? Answer: Social media (SM) is the use of information technology to support the sharing of content among networks of users. Social media enables people to form communities of practice, or communities that are groups of people related by a common interest. A social media information system (SMIS) is an information system that supports the sharing of content among networks of users. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
33) Who are social media (SM) users? Answer: Social media (SM) users include both individuals and organizations that use SM sites to build social relationships. Hundreds of millions of individuals visit SM sites on a regular basis, and they do so in several ways. Organizations are SM users too. One may not think of an organization as a typical user, but in many ways it is. Organizations create and manage SM accounts just like typical users. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 34) What are social media (SM) providers? Answer: Social media (SM) providers are the companies that operate the SM sites. Facebook, Twitter, LinkedIn, and Google are all SM providers. They provide platforms that enable the creation of social networks, or social relationships among people with common interests. They develop and operate their own custom, proprietary, social networking application software and compete with one another for the attention of users. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 35) Explain the hardware component of social media information systems (SMIS) with respect to each of the three organizational roles. Answer: Both community users and employees process social media (SM) sites using desktops, laptops, smartphones, iPads, HTML 5 devices, and, indeed, any intelligent communications device. In most cases, SM application providers host the SM presence using elastic servers in the cloud. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
36) Explain the software component of social media information systems (SMIS) with respect to each of the three organizational roles. Answer: Social media (SM) users employ browsers and client applications to communicate with other users, send and receive content, and add and remove connections to communities and other users. These include desktop and mobile applications for a variety of platforms, including iOS, Android, and Windows. SM application providers develop and operate their own custom, proprietary, social networking application software. Supporting such custom software is expensive over the long term, but SM application vendors must do so because the features and functions of their applications are fundamental to their competitive strategy. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 37) Explain the data component of social media information systems (SMIS). Answer: Social media (SM) data falls into two categories: content and connection. Content data is data and responses to data that are contributed by users. Connection data is data about relationships. Connection data differentiates SMIS from Web site applications. Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data. SM application providers store and retrieve SM data on behalf of sponsors and user communities. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 38) Explain the procedure component of social media information systems (SMIS) with respect to a user and an organization. Answer: For social networking users, procedures are informal, evolving, and socially oriented. One does what their friends do. Such informality makes using SMIS easy; it also means that unintended consequences are common. The most troubling examples concern user privacy. For organizations, social networking procedures are more formalized and aligned with an organization's strategy. Organizations develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content. For example, setting up an SMIS to gather data on product problems is a wasted expense unless procedures exist to extract knowledge from that social networking data. Organizations also need to develop procedures to manage SM risk. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
39) Explain the people component of social media information systems (SMIS) with respect to a user and an organization. Answer: Users of social media (SM) do what they want to do depending on their goals and their personalities. They behave in certain ways and observe the consequences. They may or may not change their behavior. SM users aren't necessarily rational, at least not in purely monetary ways. Organizations cannot be so casual. Anyone who uses his or her position in a company to speak for an organization needs to be trained on both SMIS user procedures and the organization's social networking policy. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.1: What is a social media information system (SMIS)? Classification: Concept 40) Social media's flow cannot be designed or diagrammed as it is very ________. A) dynamic B) static C) confounding D) simple Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 41) Value chains determine ________. A) social media's requirements B) social media's flow C) unstructured business processes D) structured business processes Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) Which of the following statements is true of social customer relationship management (CRM)? A) Relationships between organizations and customers are unchanging. B) Each customer crafts his or her own relationship with a company. C) Sales managers can control what a customer is reading about a company and its products. D) Customers who are likely to make the highest purchases are likely to receive the most attention. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 43) ________ is a dynamic social media process of employing users to participate in product design or product redesign. A) Social capitalization B) Flexible product development C) Crowdsourcing D) Collaborative product development Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 44) Since its inception, social media (SM) has been widely used to market products to end users in ________. A) improving communication channels within an organization B) business-to-business (B2B) relationships C) business-to-consumer (B2C) relationships D) promoting brand awareness Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
45) A(n) ________ social networking service like Yammer can be used to provide managers with real-time feedback about how to resolve internal operational inefficiencies. A) enterprise B) media sharing C) microblogging D) polling Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 46) Which of the following is a use of social media (SM) in human resources? A) It is used to determine performance incentives. B) It is used to keep track of employees' personal lives. C) It is used for recruiting candidates. D) It is used for terminating employees. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 47) Internal personnel social media sites such as MySite and MyProfile in SharePoint and other similar enterprise systems are used for ________. A) employee recruitment B) employee communication C) employee evaluation D) employee termination Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
48) Which of the following indicates a risk of using social media in human resources? A) recruiting employees for vacant jobs only through social media and not otherwise B) determining employee performance through social media C) probing employee personal and social life through social media D) making errors in forming conclusions about employees through social media Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 49) Which of the following statements is true of using social media to advance organizational strategies? A) The unpredictability of dynamic processes like social media is encouraged in supply chains. B) Solving supply chain problems via social media reinforces an organization's sense of privacy. C) Users who have no financial incentive are willing to provide reviews to the buyer community. D) Organizations whose business strategy involves selling to developer networks are the last to adopt SM-based customer support. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 50) Value chains determine unstructured business processes. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 51) Social media (SM) is by its very nature static. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
52) Social media's flow cannot be designed or diagrammed easily. Even if it was to be designed, the social media process would have changed even before the diagram is finished. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 53) Social media fundamentally changes the balance of power among users, their communities, and organizations. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 54) In social customer relationship management, relationships between organizations and customers are fixed. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 55) In social customer relationship management, since the relationships between organizations and customers emerge from joint activity, customers have as much control as companies. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 56) Traditional customer relationship management (CRM) flies in the face of structured and controlled processes of social CRM. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
57) eBay often solicits customers to provide feedback on their eBay experience; this is an example of crowdsourcing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 58) Social media is widely used in business-to-business relationships and not in business-tocustomer relationships. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 59) Operations use social media to improve communication channels with their customers, but not within an organization. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 60) Social media is increasingly used for finding employee prospects. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 61) Use of social media to recruit and evaluate potential employees is prohibited. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
62) Social media sites that become too defensive are obviously promulgating an unpopular management message. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 63) What was the purpose of traditional customer relationship management (CRM)? Answer: In the past, organizations controlled their relationships with customers using structured processes and related information systems. In fact, the primary purpose of traditional CRM was to manage customer touches. Traditional CRM ensured that an organization spoke to customers with one voice and that it controlled the messages, the offers, and even the support that customers received based on the value of each particular customer. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 64) Explain the social customer relationship management (CRM) process. Answer: Social CRM is a dynamic, social media-based CRM process. The relationships between organizations and customers emerge in a dynamic process as both parties create and process content. In addition to the traditional forms of promotion, employees in an organization create wikis, blogs, discussion lists, frequently asked questions, sites for user reviews and commentary, and other dynamic content. Customers search this content, contribute reviews and commentary, ask more questions, create user groups, and so forth. With social CRM, each customer crafts his or her own relationship with the company. AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
65) What is the difference between traditional customer relationship management (CRM) and social customer relationship management (CRM)? Answer: In social CRM, because relationships emerge from a joint activity, customers have as much control as companies. This characteristic is an anathema to traditional sales managers who want control over what a customer is reading, seeing, and hearing about a company and its products. Further, traditional CRM is centered on lifetime value; customers who are likely to generate the most business get the most attention and have the most impact on the organization. But, with social CRM, a customer who spends 10 cents but who is an effective reviewer, commentator, or blogger can have more influence than a quiet customer who purchases $10 million a year. Such imbalance is incomprehensible to traditional sales managers. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.2: How do SMIS advance organizational strategy? Classification: Concept 66) Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) personal reinforcement C) mobility D) nepotism Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 67) Which of the following statements is true of social capital? A) Social capital is an investment in human knowledge and skills for future profit. B) The value of social capital is determined by the number of relationships in a social network. C) Social capital can be gained by limiting the number of friends. D) Being linked into social networks undermines a professional's image and position in an organization. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
68) A person gains social capital by ________. A) adding more friends B) removing unknown friends C) adding only work-related friends D) removing people who have less social capital Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 69) Capital is defined as the investment of resources for future profit. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 70) Social capital is investment in human knowledge and skills for future profit. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 71) Being linked into social networks reinforces a professional's identity, image, and position in an organization or industry. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 72) A social networking user gains social capital by adding more friends and by strengthening relationships with existing friends. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
73) Humans have social capital, whereas organizations do not have social capital. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 74) To an organization, the strength of a relationship is the likelihood that an entity in the relationship will do something that benefits the organization. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 75) According to business literature, describe three types of capital that are used. Answer: Business literature describes three types of capital: traditional, human, and social. Karl Marx defined capital as the investment of resources for future profit. This traditional definition refers to investments into resources such as factories, machines, manufacturing equipment, and the like. In comparison, human capital is the investment in human knowledge and skills for future profit. By taking this class, people are investing in their own human capital. In other words, they are investing their money and time to obtain knowledge that they hope will differentiate them from other workers and ultimately give them a wage premium in the workforce. According to Nan Lin, social capital is investment in social relations with the expectation of returns in a marketplace. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
76) What is social capital? Answer: According to Nan Lin, social capital is investment in social relations with the expectation of returns in a marketplace. One can see social capital at work in one's personal life. They strengthen their social relationships when they help someone get a job, set a friend up on a date, or introduce a friend to someone famous. They weaken their social relationships by continually freeloading, declining requests for help, or failing to spend time with friends. In one's professional life, they are investing in their social capital when they attend a business function for the purpose of meeting people and reinforcing relationships. Similarly, one can use social media to increase their social capital by recommending or endorsing someone on LinkedIn, liking a picture on Facebook, retweeting a tweet, or commenting on an Instagram picture. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 77) According to Nan Lin, how do people benefit from social capital? Answer: According to Nan Lin, people benefit from social capital in four ways: 1) Information 2) Influence 3) Social credentials 4) Personal reinforcement First, relationships in social networks can provide information about opportunities, alternatives, problems, and other factors important to business professionals. Second, social networks provide an opportunity to influence decision makers at one's employer or in other organizations that are critical to their success. Third, being linked to a network of highly regarded contacts is a form of social credential. One can bask in the glory of those with whom they are connected. Finally, being linked into social networks reinforces a professional's identity, image, and position in an organization or industry. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.3: How do SMIS increase social capital? Classification: Concept 78) Web surfers cannot filter out advertising content. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.4: How do (some) companies earn revenue from social media? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
79) Conversion rate measures the frequency that someone who clicks on an ad makes a purchase, "likes" a site, or takes some other action desired by an advertiser. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.4: How do (some) companies earn revenue from social media? Classification: Concept 80) Why do advertisers like digital advertising? Answer: Advertisers like digital ads because unlike traditional media such as newspapers, users can respond directly to these ads by clicking on them. Run an ad in the print version of the Wall Street Journal, and one has no idea of who responds to that ad and how strongly, but place an ad for that same product in a newspaper's online version, and one will soon know the percentage of viewers who clicked that ad and what action they took next. The ability to track these statistics led to development of the pay-per-click revenue model, in which advertisers display ads to potential customers for free, and then get paid when a customer clicks on the ad. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.4: How do (some) companies earn revenue from social media? Classification: Concept 81) A ________ is a statement that delineates employees' rights and responsibilities in an organization. A) statement of purpose B) labor bill C) social media policy D) corporate datasheet Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
82) Which of the following statements is true of social networking problems? A) Responses to problematic content are best reserved for instances where it has caused an organization to do something positive. B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. C) The product development team should not receive criticisms posted on a social networking site. D) If problematic content represents reasonable criticism of the organization's products, the best response is to delete it. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept 83) Patronizing responses to comments from content contributors can generate a ________. A) positive review B) sympathetic appeal C) rise in followers count D) strong backlash Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept 84) The first step that any organization should take to manage the risk of employee communication is to develop and publicize a social media policy. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept 85) If a reasoned, nondefensive response generates continued and unreasonable user-generated content from that same source, it is best for an organization to delete it. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
86) Explain the major sources of user-generated content problems. Answer: When a business participates in a social network or opens its site to a user-generated content (UGC), it opens itself to misguided people who post junk unrelated to the site's purpose. Crackpots may also use the network or UGC site as a way of expressing passionately held views about unrelated topics, such as UFOs, government cover-ups, fantastic conspiracy theories, and so forth. Because of the possibility of such content, organizations should regularly monitor the site and remove objectionable material immediately. Unfavorable reviews are another risk. Research indicates that customers are sophisticated enough to know that few, if any, products are perfect. Most customers want to know the disadvantages of a product before purchasing it so they can determine if those disadvantages are important for their application. Mutinous movements are an extension of bad reviews. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept 87) How should one respond to social networking problems? Answer: The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content. Once such content is found, however, organizations must have a plan for creating an organization's response. Three possibilities are: 1. Leave it 2. Respond to it 3. Delete it If the problematic content represents reasonable criticism of the organization's products or services, the best response may be to leave it where it is. Such criticism indicates that the site is not just a shill for the organization, but contains legitimate user content. A second alternative is to respond to the problematic content. However, this alternative is dangerous. If the response could be construed in any way as patronizing or insulting to the content contributor, the response can enrage the community and generate a strong backlash. In most cases, responses are best reserved for when the problematic content has caused the organization to do something positive as a result. If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best for the organization to do nothing. Deleting content should be reserved for contributions that are inappropriate because they are contributed by crackpots, because they have nothing to do with the site, or because they contain obscene or otherwise inappropriate content. However, deleting legitimate negative comments can also result in a strong user backlash. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.5: How can organizations address SMIS security concerns? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
88) ________ in the context of management means loss of control of employees. A) Transcendence B) Divergence C) Emergence D) Dependence Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.6: Where is social media taking us? Classification: Concept 89) Chief Digital Officer (CDO) is a position responsible for developing and managing innovative social media programs. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.6: Where is social media taking us? Classification: Concept 90) In the context of customer relationship management (CRM), a vendor might lose control of the customer relationship. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the functions of customer relationship management (CRM) systems. Learning Obj: LO 8.6: Where is social media taking us? Classification: Concept 91) In the context of management, transcendence means loss of control of employees. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 8.6: Where is social media taking us? Classification: Concept
25 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 9 Business Intelligence Systems 1) ________ process operational and other data in organizations to analyze past performance and make predictions. A) Virtualization techniques B) Live migration techniques C) Business intelligence systems D) Windowing systems Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 2) Which of the following statements is true of business intelligence (BI) systems? A) Business intelligence systems are primarily used for developing software systems and data mining applications. B) The four standard components of business intelligence systems are software, procedures, applications, and programs. C) The software component of a business intelligence system is called an intelligence database. D) Business intelligence systems analyze an organization's past performance to make predictions. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 3) The patterns, relationships, and trends identified by BI systems are called business intelligence. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 4) As information systems, BI systems have three standard components. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 1 Copyright © 2016 Pearson Education, Inc.
5) The data that an organization purchases from data vendors can act as the source data for a business intelligence system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 6) Project management is one of the few domains in which business intelligence is rarely used. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 7) Using BI for identifying changes in the purchasing patterns of customers is a labor-intensive process. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 8) Business intelligence enables police departments to better utilize their personnel through predictive policing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 9) What are business intelligence systems? Answer: Business intelligence (BI) systems are information systems that process operational and other data to analyze past performance and to make predictions. The patterns, relationships, and trends identified by BI systems are called business intelligence. As information systems, BI systems have five standard components: hardware, software, data, procedures, and people. The software component of a BI system is called a BI application. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
10) How does business intelligence help marketers identify changes in the purchasing patterns of customers? Answer: Retailers know that important life events cause customers to change what they buy and, for a short interval, to form new loyalties to new store brands. Before the advent of BI, stores would watch the local newspapers for graduation, marriage, and baby announcements and send ads in response, which is a slow, labor-intensive, and expensive process. However, by applying business intelligence techniques to their sales data, companies can identify the purchasing pattern for different products, and by observing this purchasing pattern, companies can send ads for related products to those customers. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 11) What is predictive policing? Answer: Many police departments are facing severe budget constraints that force them to reduce on-duty police personnel and services. Given these budget cuts, police departments need to find better ways of utilizing their personnel. Predictive policing uses business intelligence to analyze data on past crimes, including location, date, time, day of week, type of crime, and related data, to predict where crimes are likely to occur. Police personnel are then stationed in the best locations for preventing those crimes. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.1: How do organizations use business intelligence (BI) systems? Classification: Concept 12) ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) Data manipulation B) BI analysis C) Publish results D) Data acquisition Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
13) Which of the following is a fundamental category of business intelligence (BI) analysis? A) data acquisition B) reporting C) push publishing D) pull publishing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 14) Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it? A) data acquisition B) BI analysis C) publish results D) data mining Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 15) ________ is the process of delivering business intelligence to users without any request from the users. A) Push publishing B) Pull publishing C) Data acquisition D) Data mining Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
16) ________ requires users to request business intelligence results. A) Push publishing B) Pull publishing C) Data acquisition D) Data mining Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 17) BI analysis is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 18) The three fundamental categories of BI analysis are reporting, data mining, and BigData. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 19) Push publishing requires a user to request BI results. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
20) What are the three primary activities in the business intelligence process? Answer: The three primary activities in the business intelligence process include: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Business intelligence analysis is the process of creating business intelligence and includes three fundamental categories: reporting, data mining, and BigData. Publish results is the process of delivering business intelligence to the knowledge workers who need it. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 21) Differentiate between push publishing and pull publishing. Answer: Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an event or particular data condition. Pull publishing requires the user to request BI results. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.2: What are the three primary activities in the BI process? Classification: Concept 22) The use of an organization's operational data as the source data for a business intelligence system is not usually recommended because it ________. A) is not possible to create reports based on operational data B) is not possible to perform business intelligence analyses on operational data C) requires considerable processing and can drastically reduce system performance D) considers only the external data and not the internal data regarding the organization's functions Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
23) A ________ is a facility for managing an organization's business intelligence data. A) datasheet B) dataspace C) data warehouse D) data table Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 24) The source, format, assumptions and constraints, and other facts concerning certain data are called ________. A) metadata B) data structures C) microdata D) network packets Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 25) Problematic data are termed ________. A) random data B) macro data C) vague data D) dirty data Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) Which of the following problems is particularly common for data that have been gathered over time? A) wrong granularity B) lack of integration C) lack of consistency D) missing values Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 27) ________ refers to the level of detail represented by data. A) Abstraction B) Granularity C) Dimensionality D) Aggregation Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 28) Which of the following statements is true of data with granularity? A) It can be too fine or too coarse and also have wrong granularity. B) If granularity is too coarse, data can be made finer by summing and combining. C) It is not possible to have a wrong granularity for a data. D) If granularity is too coarse, data can be separated into constituent parts using regression. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) The more attributes there are in a sample data, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? A) the free rider problem B) the curse of dimensionality C) the tragedy of the commons D) the zero-sum game Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 30) A ________ is a data collection, smaller than the data warehouse that addresses the needs of a particular department or functional area of a business. A) data mart B) data room C) datasheet D) dataspace Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 31) A ________ is designed to extract data from operational systems and other sources, clean the data, and store and catalog that data for processing by business intelligence tools. A) data mart B) data center C) data room D) data warehouse Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
32) Users in a data mart obtain data that pertain to a particular business function from a ________. A) data room B) data center C) datasheet D) data warehouse Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 33) Which of the following statements is true of a data warehouse? A) A data warehouse is larger than a data mart. B) A data warehouse functions like a retail store in a supply chain. C) Users in a data warehouse obtain data pertaining to a business function from a data mart. D) Data analysts who work with a data warehouse are experts in a particular business function. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 34) A data warehouse is a facility for managing an organization's business intelligence data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 35) External data purchased from outside resources are not included in data warehouses. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
36) Placing BI applications on operational servers can dramatically reduce system performance. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 37) Data inconsistencies can occur from the nature of a business activity. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 38) Data granularity refers to the level of detail represented by data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 39) The granularity in clickstream data is too coarse. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 40) If the granularity of certain data is too coarse, the data can be separated into constituent parts using statistical techniques. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
41) The curse of dimensionality states that the more attributes there are, the more difficult it is to build a model that fits the sample data. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 42) Data marts are data collections that address the needs of a particular department or functional area of a business. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 43) Data marts are usually larger than data warehouses. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 44) Data analysts who work with data warehouses are experts at data management, data cleaning, data transformation, and data relationships. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
45) Users in a data mart obtain data that pertain to a particular business function from a data warehouse. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 46) An advantage of data warehouses is the low cost required to create, staff, and operate them. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 47) Explain the functions of a data warehouse. Answer: The functions of a data warehouse are to: 1. Obtain data 2. Cleanse data 3. Organize and relate data 4. Catalog data Programs read operational and other data and extract, clean, and prepare that data for business intelligence processing. The prepared data are stored in a data warehouse database using a data warehouse DBMS, which can be different from an organization's operational DBMS. Data warehouses include data that are purchased from outside sources. Metadata concerning the data– its source, its format, its assumptions and constraints, and other facts about the data–are kept in a data warehouse metadata database. The data warehouse DBMS extracts and provides data to BI applications. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
48) What is data granularity? Answer: Data granularity refers to the level of detail represented by data. Granularity can be too fine or too coarse. In general, it is better to have too fine a granularity than too coarse. If the granularity is too fine, the data can be made coarser by summing and combining. If the granularity is too coarse, however, there is no way to separate the data into constituent parts. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 49) What is clickstream data? Answer: Clickstream data is the data that is captured from customers' clicking behavior. Such data is very fine and includes everything a customer does at a Web site. Because the data is too fine, data analysts must throw away millions and millions of clicks if a study requires data that is coarser. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 50) Explain the curse of dimensionality. Answer: The curse of dimensionality is associated with the problem of data having too many attributes. For example, if internal customer data is combined with customer data that has been purchased, there will be more than hundred different attributes to consider. It is hard to select only a few attributes from those available. The curse of dimensionality states that the more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
51) What are the functions of a data warehouse? Answer: A data warehouse takes data from data manufacturers (operational systems and other sources), cleans and processes the data, and locates the data on the shelves of the data warehouse. Data analysts who work with a data warehouse are experts at data management, data cleaning, data transformation, data relationships, and the like. However, they are not usually experts in a given business function. The data warehouse then distributes the data to data marts. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 52) How is a data warehouse different from a data mart? Answer: A data warehouse can be compared to a distributor in a supply chain. The data warehouse takes data from the data manufacturers (operational systems and other sources), cleans and processes the data, and locates the data on the shelves of the data warehouse. The data analysts who work with a data warehouse are experts at data management, data cleaning, data transformation, data relationships, and the like. The data warehouse then distributes the data to data marts. A data mart is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. If a data warehouse is the distributor in a supply chain, then a data mart is like a retail store in a supply chain. Users in a data mart obtain data that pertain to a particular business function from a data warehouse. Such users do not have the data management expertise that data warehouse employees have, but they are knowledgeable analysts for a given business function. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.3: How do organizations use data warehouses and data marts to acquire data? Classification: Concept 53) ________ is the process of sorting, grouping, summing, filtering, and formatting structured data. A) Push publishing B) Publish results C) Cloud computing D) Reporting analysis Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
54) Which of the following refers to data in the form of rows and columns? A) granulated data B) structured data C) micro data D) coarse data Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 55) The goal of ________, a type of business intelligence analysis, is to create information about past performance. A) push publishing B) data mining C) reporting analyses D) BigData Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 56) ________ are reports produced when something out of predefined bounds occurs. A) Exception reports B) Static reports C) Dynamic reports D) Subscription reports Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
57) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data encryption B) Data warehousing C) Data mining D) Data decryption Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 58) ________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning. A) Push publishing B) Pull publishing C) Data mining D) Exception reporting Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 59) Which of the following statements is true of unsupervised data mining? A) Analysts apply unsupervised data mining techniques to estimate the parameters of a developed model. B) Analysts create hypotheses only after performing an analysis. C) Regression analysis is the most commonly used unsupervised data mining technique. D) Data miners develop models prior to performing an analysis. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
60) ________ is an unsupervised data mining technique in which statistical techniques identify groups of entities that have similar characteristics. A) Cluster analysis B) Content indexing C) Regression analysis D) Cloud computing Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 61) In the case of ________, data miners develop models prior to conducting analyses and then apply statistical techniques to data to estimate parameters of the models. A) pull publishing techniques B) supervised data mining C) push publishing techniques D) unsupervised data mining Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 62) Regression analysis is used in ________. A) progress reporting B) bug reporting C) supervised data mining D) unsupervised data mining Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
63) ________ is used to measure the impact of a set of variables on another variable during data mining. A) Cluster analysis B) Context indexing C) Cloud computing D) Regression analysis Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 64) Which of the following statements is true of BigData? A) BigData contains only structured data. B) BigData has low velocity and is generated slowly. C) BigData cannot store graphics, audio, and video files. D) BigData refers to data sets that are at least a petabyte in size. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 65) In the ________ phase, a BigData collection is broken into pieces and hundreds or thousands of independent processors search these pieces for something of interest. A) crash B) break C) reduce D) map Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
66) The results generated in the map phase are combined in the ________ phase. A) pig B) control C) reduce D) construct Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 67) ________ is an open source program supported by the Apache Foundation that manages thousands of computers and that implements MapReduce. A) Hadoop B) BigData C) Linux D) Apache Wave Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 68) Which of the following statements is true of Hadoop? A) Hadoop is written in C++ and runs on Linux. B) Hadoop includes a query language called Big. C) Hadoop is an open source program that implements MapReduce. D) Technical skills are not required to run and use Hadoop. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 69) Reporting analysis is used primarily for classifying and predicting BI data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
70) Structured data is data in the form of rows and columns. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 71) With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 72) Regression analysis is used to identify groups of entities that have similar characteristics. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 73) Cluster analysis measures the impact of a set of variables on another variable. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 74) BigData refers to data that have great variety and may have structured data as well as different formats. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
75) BigData has low velocity and is generated slowly. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 76) MapReduce is a technique for harnessing the power of thousands of computers working in parallel. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 77) BigData has volume, velocity, and variation characteristics that far exceed those of traditional reporting and data mining. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 78) What is data mining? Answer: Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data mining techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence, and machine-learning. Most data mining techniques are sophisticated, and many are difficult to use well. Such techniques are valuable to organizations, and some business professionals, especially those in finance and marketing, have become expert in their use. Data mining techniques fall into two broad categories: unsupervised and supervised. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
79) What is unsupervised data mining? Answer: With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply a data mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. These findings are obtained solely by data analysis. One common unsupervised technique is cluster analysis. With it, statistical techniques identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers from customer order and demographic data. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 80) Explain supervised data mining. Answer: With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. For example, suppose marketing experts in a communications company believe that cell phone usage on weekends is determined by the age of the customer and the number of months the customer has had the cell phone account. A data mining analyst would then run an analysis that estimates the impact of customer and account age. One such analysis, which measures the impact of a set of variables on another variable, is called a regression analysis. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept 81) What is BigData? Answer: BigData is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety. Considering volume, BigData refers to data sets that are at least a petabyte in size, and usually larger. Additionally, BigData has high velocity, meaning that it is generated rapidly. BigData is varied. BigData may have structured data, but it also may have free-form text, dozens of different formats of Web server and database log files, streams of data about user responses to page content, and possibly graphics, audio, and video files. BigData analysis can involve both reporting and data mining techniques. The chief difference is, however, that BigData has volume, velocity, and variation characteristics that far exceed those of traditional reporting and data mining. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.4: What are the three techniques for processing BI data? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
82) ________ are business intelligence documents that are fixed at the time of creation and do not change. A) Critical reports B) Dynamic reports C) Static reports D) Exception reports Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 83) ________ reports are business intelligence documents that are updated at the time they are requested. A) Subscription B) Third-party cookie C) Static D) Dynamic Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 84) ________ are user requests for particular business intelligence results on a particular schedule or in response to particular events. A) Subscriptions B) Third-party cookies C) Static reports D) Dynamic reports Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
85) Which of the following statements is true of business intelligence (BI) publishing alternatives? A) The skills required to publish static content are extremely high. B) Publishing dynamic BI is more difficult than publishing static content. C) For static content, the skill required to create a publishing application is high. D) For Web servers, push options are manual. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 86) The ________ of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users. A) exception report B) dynamic report C) delivery function D) management function Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 87) Static reports are business intelligence documents that are updated at the time they are requested. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 88) A printed sales analysis is an example of a dynamic report. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept
25 Copyright © 2016 Pearson Education, Inc.
89) Push options are manual when emails or collaboration tools are used for BI publishing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 90) For dynamic content, the skills required to create a publishing application are low. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 91) The management function of BI servers maintains metadata about the authorized allocation of BI results to users. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept 92) Differentiate between static reports and dynamic reports. Answer: Static reports are business intelligence documents that are fixed at the time of creation and do not change. A printed sales analysis is an example of a static report. In the business intelligence context, most static reports are published as PDF documents. Dynamic reports are business intelligence documents that are updated at the time they are requested. A sales report that is current as of the time a user accessed it on a Web server is a dynamic report. In almost all cases, publishing a dynamic report requires the business intelligence application to access a database or other data source at the time the report is delivered to the user. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different business intelligence systems. Learning Obj: LO 9.5: What are the alternatives for publishing BI? Classification: Concept
26 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 10 Information Systems Security 1) A(n) ________ is a measure that individuals or organizations take to block a threat from obtaining an asset. A) denial of service B) safeguard C) information silo D) third-party cookie Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 2) ________ occurs when a threat obtains data that is supposed to be protected. A) Unauthorized data disclosure B) Incorrect data modification C) Faulty service D) Denial of service Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 3) A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________. A) hacking B) data mining C) pretexting D) sniffing Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Application
1 Copyright © 2016 Pearson Education, Inc.
4) A ________ pretends to be a legitimate company and sends emails requesting confidential data. A) hacker B) phisher C) wardriver D) sniffer Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 5) Mark receives an email from his bank asking him to update and verify his credit card details. He replies to the mail with all the requested details. Mark later learns that the mail was not actually sent by his bank and that the information he had shared has been misused. Mark is a victim of ________. A) hacking B) sniffing C) data mining D) phishing Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Application 6) Which of the following is a synonym for phishing? A) pretexting B) email spoofing C) hardening D) system hacking Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) ________ is a technique for intercepting computer communications. A) Spoofing B) Phishing C) Pretexting D) Sniffing Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 8) ________ take computers with wireless connections through an area and search for unprotected wireless networks. A) Sniffers B) Pretexters C) Hackers D) Phishers Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 9) Breaking into computers, servers, or networks to steal proprietary and confidential data is referred to as ________. A) pretexting B) spoofing C) hacking D) phishing Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
10) Which of the following occurs when millions of bogus service requests flood a Web server and prevent it from servicing legitimate requests? A) spoofing B) incorrect data modification C) usurpation D) denial of service Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 11) ________ occurs when computer criminals invade a computer system and replace legitimate programs with their own unauthorized ones. A) Usurpation B) Cyber stalking C) Spoofing D) Sniffing Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 12) A(n) ________ is a sophisticated, possibly long-running computer hack that is perpetrated by large, well-funded organizations like governments. A) advanced persistent threat B) identity threat C) copyright theft D) network sniffer attack Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 13) A threat is a person or an organization that seeks to obtain or alter data illegally, without the owner's permission or knowledge. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 4 Copyright © 2016 Pearson Education, Inc.
14) Pretexting occurs when someone deceives by pretending to be someone else. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 15) Spoofing is a technique for intercepting computer communications. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 16) IP spoofing occurs when an intruder uses another site's IP address to masquerade as that other site. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 17) Wardrivers are those who engage in phishing to obtain unauthorized access to data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 18) Incorrectly increasing a customer's discount is an example of incorrect data modification. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
19) Advanced persistent threats can be a means to engage in cyber warfare and cyber espionage. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 20) Explain the types of events that result in faulty service, a type of security loss. Answer: Faulty service includes problems that result because of incorrect system operation. It could include incorrect data modification. It also could include systems that work incorrectly by sending wrong goods to a customer or the ordered goods to a wrong customer, inaccurately billing customers, or sending the wrong information to employees. Humans can inadvertently cause faulty service by making procedural mistakes. System developers can write programs incorrectly or make errors during installation of hardware, software programs, and data. Usurpation is also a type of faulty service. Faulty service can also result when a service is improperly restored during recovery from natural disasters. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept 21) Explain the concept of denial of service (DOS) in information management. Answer: Human errors in a procedure or a lack of procedures in information management can result in denial of service (DOS). For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. Denial-ofservice attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Natural disasters may also cause systems to fail, resulting in denial of service. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.1: What is the goal of information systems security? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
22) Which of the following statements is true of the financial losses due to computer crimes? A) All studies on the costs of computer crimes are based on surveys. B) There are several set standards for tallying computer crime costs and financial losses. C) Companies are legally required to calculate their financial losses due to computer crime every month. D) Knowledge about the cost of computer crimes is restricted to large companies. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.2: How big is the computer security problem? Classification: Concept 23) Damages to security systems caused by natural disasters are minimal when compared to the damages due to human errors. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.2: How big is the computer security problem? Classification: Concept 24) There are no standards for tallying costs of computer crime. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.2: How big is the computer security problem? Classification: Concept 25) A(n) ________ is a computer program that senses when another computer is attempting to scan a disk or access a computer. A) intrusion detection system B) adware C) packet-filtering firewall D) network security system Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) Which of the following is considered a personal security safeguard? A) creating backup of cookies and temporary files B) removing high-value assets from computers C) using a single valid password for all accounts D) conducting transactions using http rather than https Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 27) Davian, a professional hacker, tries every possible combination of characters to crack his victim's email password. Using this technique, he can crack a six-character password of either upper- or lowercase letters in about five minutes. Which of the following techniques is used by Davian to obtain access to his victim's email? A) denial-of-service attack B) brute force attack C) pretexting D) spoofing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Application 28) ________ are small files that browsers store on users' computers when they visit Web sites. A) Cookies B) Honeypots C) Mashups D) Entity tags Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 29) In a brute force attack, a password cracker tries every possible combination of characters. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 8 Copyright © 2016 Pearson Education, Inc.
30) As one of the safeguards against security threats, a person should preferably use the same password for different sites so as to avoid confusion. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 31) While making online purchases, a person should buy only from vendors who support https. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 32) What are some of the recommended personal security safeguards against security threats? Answer: Following are some of the recommended personal security safeguards against security threats: 1. Create strong passwords. 2. Use multiple passwords. 3. Send no valuable data via email or IM. 4. Use https at trusted, reputable vendors. 5. Remove high-value assets from computers. 6. Clear browsing history, temporary files, and cookies. 7. Update antivirus software. 8. Demonstrate security concern to fellow workers. 9. Follow organizational security directives and guidelines. 10. Consider security for all business initiatives. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.3: How should you respond to security threats? Classification: Concept 33) Which of the following is a human safeguard against security threats? A) encryption B) firewall C) physical security D) procedure design Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 9 Copyright © 2016 Pearson Education, Inc.
34) Which of the following is a technical safeguard against security threats? A) password B) encryption C) compliance D) firewall Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 35) Which of the following is a data safeguard against security threats? A) application design B) accountability C) physical security D) malware protection Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 36) Backup and recovery against computer security threats are ________. A) technical safeguards B) data safeguards C) human safeguards D) hardware safeguards Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 37) Risk management is a critical security function addressed by an organization's senior management. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Financial institutions must invest heavily in security safeguards because they are obvious targets for theft. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 39) Malware protection is an example of a technical safeguard. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 40) Hiring, training, and educating employees in an organization is a technical safeguard. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 41) Technical safeguards include encryption and usage of passwords. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) What are the two critical security functions that an organization's senior management needs to address? Answer: Senior management in an organization needs to address two critical security functions: security policy and risk management. Considering the first, senior management must establish company-wide security policies. Take, for example, a data security policy that states the organization's posture regarding data it gathers about its customers, suppliers, partners, and employees. At a minimum, the policy should stipulate: what sensitive data the organization will store, how it will process that data, whether data will be shared with other organizations, how employees and others can obtain copies of data stored about them, and how employees and others can request changes to inaccurate data. The specifics of a policy depend on whether the organization is governmental or nongovernmental, on whether it is publically held or private, on the organization's industry, on the relationship of management to employees, and other factors. The second senior management security function is to manage risk. Risk cannot be eliminated, so to manage risk means to proactively balance the trade-off between risk and cost. This trade-off varies from industry to industry and from organization to organization. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.4: How should organizations respond to security threats? Classification: Concept 43) To safeguard data against security threats, every information system today requires a user name and a password. In this case, which of the following functions is performed by the user name? A) authentication B) identification C) decryption D) encryption Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 44) Every information system today should require users to sign on with a user name and a password. In this case, which of the following functions is performed by the user's password? A) authentication B) identification C) decryption D) encryption Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 12 Copyright © 2016 Pearson Education, Inc.
45) Which of the following information should be provided by users of smart cards for authentication? A) personal identification number B) permanent account number C) fingerprint D) retinal scan Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 46) A ________ is a plastic card that has a microchip loaded with identifying data. A) credit card B) biometric passport C) smart card D) flashcard Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 47) Which of the following uses an individual's personal physical characteristics such as fingerprints, facial features, and retinal scans for verification purposes? A) credit card B) smart card C) biometric authentication D) symmetric encryption Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
48) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Usurpation B) Authentication C) Malware protection D) Encryption Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 49) Which of the following statements is true of symmetric encryption? A) It uses the same key for both encoding and decoding. B) It is more difficult and slower than asymmetric encryption. C) It does not require a key to encrypt or decrypt data. D) It uses a special version called public/private key on the Internet for a secure communication. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 50) Most secure communications over the Internet use a protocol called ________. A) smtp B) ftp C) https D) nntp Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
51) With https, data are encrypted using a protocol called the ________. A) Secure Shell (SSH) B) Secure Sockets Layer (SSL) C) File Transfer Protocol (FTP) D) Post Office Protocol (POP) Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 52) Which of the following types of encryption is used by the secure sockets layer protocol? A) optical encryption B) physical layer encryption C) disk encryption D) public key encryption Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 53) A(n) ________ sits outside an organizational network and is the first device that Internet traffic encounters. A) internal firewall B) perimeter firewall C) adware D) malware Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
54) A(n) ________ examines the source address, destination address, and other data of a message and determines whether to let that message pass. A) encrypted firewall B) internal malware C) packet-filtering firewall D) perimeter shareware Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 55) ________ is a broad category of software that includes viruses, worms, Trojan horses, spyware, and adware. A) Malware B) Payload C) Shareware D) Firewall Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 56) ________ are viruses that masquerade as useful programs like a computer game, an MP3 file, or some other useful innocuous program. A) Key loggers B) Trojan horses C) Worms D) Payloads Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
57) Adware and spyware are similar to each other in that they both ________. A) masquerade as useful programs B) are specifically programmed to spread C) are installed with a user's permission D) reside in the background and observe a user's behavior Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 58) Technical safeguards involve both software and hardware components of an information system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 59) A user name authenticates a user, and a password identifies that user. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 60) Smart cards are convenient to use because they do not require a personal identification number for authentication. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 61) A criticism of biometric authentication is that it provides weak authentication. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
62) With asymmetric encryption, two different keys are used for encoding and decoding a message. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 63) In the case of public key encryption, each site has a private key to encode a message and a public key to decode it. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 64) Packet-filtering firewalls cannot prohibit outsiders from starting a session with any user behind the firewall. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 65) A key is a number used with an encryption algorithm to encrypt data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 66) Packet-filtering firewalls are the most sophisticated type of firewall. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
67) Spyware programs are installed on a user's computer without the user's knowledge. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 68) Viruses, worms, and Trojan horses are types of firewalls. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 69) A virus is a computer program that replicates itself. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 70) Malware definitions are patterns that exist in malware code. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 71) Discuss briefly the pros and cons of biometric authentication. Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. It provides a strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
72) Explain how secure sockets layer works when a user communicates securely with a Web site. Answer: Most secure communication over the Internet uses a protocol called https. With https, data are encrypted using a protocol called the Secure Sockets Layer (SSL), which is also known as Transport Layer Security (TLS). SSL/TLS uses a combination of public key encryption and symmetric encryption. Symmetric encryption is fast and is preferred. But the two parties, the user and a Web site, do not share a symmetric key. So, they use public key encryption to share the same symmetric key. The following are the steps involved in this secure communication: 1. A user's computer obtains the public key of a Web site to which it will connect. 2. The user's computer generates a key for symmetric encryption. 3. The user's computer encodes that key using the Web site's public key. It sends the encrypted symmetric key to the Web site. 4. The Web site then decodes the symmetric key using its private key. 5. From that point forward, the user's computer and the Web site communicate using symmetric encryption. At the end of the session, the user's computer and the secure site discard the keys. Using this strategy, the bulk of the secure communication occurs using the faster symmetric encryption. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 73) Explain the functions performed by packet-filtering firewalls. Answer: A packet-filtering firewall examines each part of a message and determines whether to let that part pass. To make this decision, it examines the source address, the destination addresses, and other data. Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind the firewall. They can also disallow traffic from particular sites, such as known hacker addresses. They can prohibit traffic from legitimate, but unwanted, addresses, such as competitors' computers, and filter outbound traffic as well. They can keep employees from accessing specific sites, such as competitors' sites, sites with pornographic material, or popular news sites. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
74) What are the precautions to be taken when opening email attachments to avoid malwares? Answer: Users should open email attachments only from known sources. Also, even when opening attachment from known sources, users should do so with great care. With a properly configured firewall, email is the only outside-initiated traffic that can reach user computers. Most antimalware programs check email attachments for malware code. However, all users should form the habit of never opening an email attachment from an unknown source. Also, if users receive an unexpected email from a known source or an email from a known source that has a suspicious subject, odd spelling, or poor grammar, they should not open the attachment without first verifying with the known source that the attachment is legitimate. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.5: How can technical safeguards protect against security threats? Classification: Concept 75) Thomas is responsible for creating backup copies of information in a system. He also works along with IT personnel to ensure that the backups are valid and that effective recovery procedures exist. Thomas is involved in establishing ________. A) human safeguards B) data safeguards C) technical safeguards D) hardware safeguards Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Application 76) ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. A) Database administration B) Data encapsulation C) Data administration D) Database encapsulation Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
77) The procedure of entrusting a party with a copy of an encryption key that can be used in case the actual key is lost or destroyed is called ________. A) key escrow B) pledged encryption C) insured encryption D) key replication Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Concept 78) The creation of backup copies of database contents makes the data more vulnerable to security threats. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Concept 79) The loss of encryption keys by employees is referred to as key escrow. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Concept 80) Explain the functions of the two organizational units responsible for data safeguarding. Answer: Data safeguards protect databases and other organizational data. Two organizational units are responsible for data safeguards–data administration and database administration. Data administration refers to an organization-wide function that is in charge of developing data policies and enforcing data standards. Database administration refers to a function that pertains to a particular database. ERP, CRM, and MRP databases each have a database administration function. Database administration develops procedures and practices to ensure efficient and orderly multiuser processing of the database, to control changes to the database structure, and to protect the database. Both data and database administration are involved in establishing data safeguards. First, data administration should define data policies. Then, data administration and database administrations work together to specify user data rights and responsibilities. Third, those rights are enforced by user accounts that are authenticated at least by passwords. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.6: How can data safeguards protect against security threats? Classification: Concept 22 Copyright © 2016 Pearson Education, Inc.
81) Which of the following statements is true of position sensitivity? A) It is a type of data safeguard. B) It enables security personnel to prioritize their activities in accordance with the possible risk and loss if documented. C) It refers to the specific documentation of highly sensitive jobs. D) It increases the effectiveness of user accounts by giving users the maximum possible privilege needed to perform their job. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 82) Which of the following are the three independent factors that constitute the enforcement of security procedures and policies? A) centralized reporting, preparation, and practice B) hiring, screening, and terminating C) separation of duties, provision of maximum privilege, and position sensitivity D) responsibility, accountability, and compliance Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 83) In terms of password management, when an account is created, users should ________. A) create two passwords and switch back and forth between the two B) immediately change the password they are given to a password of their own C) maintain the same password they are given for all future authentication purposes D) ensure that they do not change their passwords frequently to reduce the risk of password theft Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
84) ________ a site means to take extraordinary measures to reduce a system's vulnerability. A) Pretexting B) Hacking C) Spoofing D) Hardening Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 85) ________ are created by companies as false targets for computer criminals to attack. A) Negatives B) Honeypots C) Cookies D) Trojan horses Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 86) In an organization, security sensitivity for each position should be documented. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 87) Existence of accounts that are no longer necessary does not pose a security threat. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
88) A help-desk information system has answers to questions that only a true user of an account or system would know. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 89) Explain how defining positions in an organization can safeguard against security threats. Answer: Effective human safeguards begin with definitions of job tasks and responsibilities. In general, job descriptions should provide a separation of duties and authorities. For example, no single individual should be allowed to both approve expenses and write checks. Instead, one person should approve expenses, another pay them, and a third should account for the payment. Similarly, in an inventory, no single person should be allowed to authorize an inventory withdrawal and also to remove the items from the inventory. Given appropriate job descriptions, user accounts should be defined to give users the least possible privilege needed to perform their jobs. Similarly, user accounts should prohibit users from accessing data their job description does not require. Because of the problem of semantic security, access to even seemingly innocuous data may need to be limited. Finally, security sensitivity should be documented for each position. Some jobs involve highly sensitive data. Other positions involve no sensitive data. Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 90) What human safeguards should be taken against security threats for temporary personnel, vendors, and partner personnel? Answer: Business requirements may necessitate opening information systems to nonemployee personnel – temporary personnel, vendors, partner personnel (employees of business partners), and the public. In the case of temporary, vendor, and partner personnel, a contract that governs an activity should call for security measures appropriate to the sensitivity of data and information system resources involved. Companies should require vendors and partners to perform appropriate screening and security training. The contract also should mention specific security responsibilities that are particular to the work to be performed. Companies should provide accounts and passwords with the least privilege and remove those accounts as soon as possible. Although temporary personnel can be screened, to reduce costs the screening will be abbreviated from that for employees. But in most cases, companies cannot screen either vendor or partner personnel. Public users cannot be screened at all. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.7: How can human safeguards protect against security threats? Classification: Concept 25 Copyright © 2016 Pearson Education, Inc.
91) A(n) ________ includes how employees should react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. A) application design B) activity log C) systems procedure D) incident-response plan Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.8: How should organizations respond to security incidents? Classification: Concept 92) Incident-response plans should provide centralized reporting of all security incidents. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.8: How should organizations respond to security incidents? Classification: Concept 93) Describe an incident-response plan. Answer: Every organization should have an incident-response plan as part of its security program. The plan should include how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. The plan should provide centralized reporting of all security incidents that will enable an organization to determine if it is under systematic attack or whether an incident is isolated. Centralized reporting also allows the organization to learn about security threats, take consistent actions in response, and apply specialized expertise to all security problems. Viruses and worms can spread very quickly across an organization's networks, and a fast response will help to mitigate the consequences. Because of the need for speed, preparation pays. The incidentresponse plan should identify critical personnel and their off-hours contact information. These personnel should be trained on where to go and what to do when they get there. Finally, organizations should periodically practice incident response. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 10.8: How should organizations respond to security incidents? Classification: Concept
26 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 11 Information Systems Management 1) ________ is a title given to the principal manager of an organizations IS department A) Chief executive officer B) Chief technology officer C) Chief information officer D) Chief operating officer Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 2) Which of the following staff functions is at the top-most level of a typical senior-level reporting relationship? A) chief information officer (CIO) B) chief operating officer (COO) C) chief technology officer (CTO) D) chief financial officer (CFO) Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 3) In an organization, the IS department's principal manager is called the ________. A) chief information officer B) chief executive officer C) chief technology officer D) chief operating officer Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) In organizations where primary information systems support only accounting activities, a reporting arrangement wherein the chief information officer reports to the ________ is practical. A) chief executive officer B) chief operating officer C) chief financial officer D) chief technology officer Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 5) In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the chief information officer reports to the ________ is more common and effective. A) chief technology officer B) chief financial officer C) VP manufacturing D) chief executive officer Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 6) An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information. A) operations B) development C) technology D) data administration Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) The ________ evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization. A) chief financial officer B) supply chain manager C) human resource manager D) chief technology officer Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 8) The ________ group investigates new information systems and determines how the organization can benefit from them. A) outsourcing relations B) development C) technology D) operations Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 9) The ________ group manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media. A) technology B) operations C) development D) outsourcing relations Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
10) The ________ group within the information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems. A) technology B) operations C) development D) data administration Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 11) Which of the following statements is true of the development group of a company's information systems (IS) department? A) The size and structure of the group depends on whether programs are developed in-house or outsourced. B) An important function of this group is to monitor user experience and respond to user problems. C) This group plays a major role in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. D) The purpose of this group is to protect data and information assets by establishing data standards and data management practices and policies. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 12) If a company's information systems (IS) related programs are not developed in-house, then the development group of the IS department will be staffed primarily by ________. A) test engineers B) systems analysts C) technical writers D) programmers Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
13) Which of the following is true if the development group of a company's information systems (IS) department is staffed primarily by programmers, test engineers, technical writers, and other development personnel? A) The company develops programs in-house. B) The company has a separate department for data warehousing. C) The company has security issues with the department. D) The company contracts work to other companies. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 14) The ________ group's purpose is to protect information assets by establishing standards and management practices and policies. A) outsourcing relations B) operations C) development D) data administration Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 15) Which of the following is a responsibility of a systems analyst? A) advising the chief information officer on emerging technologies B) determining system requirements C) monitoring and fixing computer networks D) managing the IT department Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
16) A ________ designs and writes computer codes. A) technical writer B) systems analyst C) programmer D) business analyst Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 17) A ________ monitors, maintains, fixes, and tunes computer networks. A) technical writer B) network programmer C) PQA test engineer D) network administrator Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 18) A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and is required to have an entrepreneurial attitude. A) systems analyst B) consultant C) small-scale project manager D) database administrator Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
19) Which of the following is a responsibility of a small-scale project manager? A) Initiate, plan, manage, monitor, and close down projects. B) Develop test plans, design and write automated test scripts, and perform testing. C) Advise the chief information officer, executive group, and project managers on emerging technologies. D) Help users solve problems, provide training. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 20) Protection of information assets is a major function of an information systems (IS) department. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 21) The structure of an information systems (IS) department typically remains unchanged among organizations. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 22) The responsibilities of a chief information officer are the same as those of a chief technology officer. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
23) It is a chief technology officer's responsibility to identify new technologies relevant to an organization. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 24) An operations group within an IT department may include programmers, test engineers, and technical writers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 25) An information systems (IS) department is responsible for adapting infrastructure and systems for new business goals. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 26) An important function of the development group of a company's information systems (IS) department is to monitor user experience and respond to user problems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 27) The purpose of an outsourcing relations department is to negotiate agreements with other companies to provide equipment, applications, or other services. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
28) In the context of information systems, maintenance means fixing problems or adapting existing information systems to support new features and functions. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 29) Information technology concerns products, techniques, procedures, and designs of computerbased technology. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 30) Information technology must be placed into the structure of the information systems (IS) before an organization can use it. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 31) A technical writer writes program documentation, help-text, procedures, job descriptions, and training materials. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 32) Large-scale project managers require deeper project management knowledge than smallscale managers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 9 Copyright © 2016 Pearson Education, Inc.
33) A user support representative installs software and repairs computer equipment. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 34) A systems analyst monitors, fixes, and tunes computer networks. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 35) A salesperson's responsibility is to design and write computer programs. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 36) A database administrator's responsibility is to design and write automated test scripts. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 37) What are the major functions of an information systems (IS) department? Answer: The major functions of an information systems department are to: • plan the use of information systems (IS) to accomplish organizational goals and strategy • manage outsourcing relationships • protect information assets • develop, operate, and maintain the organization's computing infrastructure • develop, operate, and maintain applications AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Compare the role of a chief information officer (CIO) and the role of a chief technology officer (CTO). Answer: A chief information officer (CIO) is generally the title of the principal manager of an organization's information systems (IS) department. Like other senior executives, the CIO reports to the chief executive officer (CEO), although sometimes these executives report to the chief operating officer (COO), who in turn reports to the CEO. In some companies, the CIO reports to the chief financial officer (CFO). The CIO has the responsibility of managing the IT department, communicating with executive staff on IT- and IS-related matters. The CIO is also a member of the executive group. A chief technology officer (CTO) often heads the technology group within the IT department. The CTO evaluates new technologies, new ideas, and new capabilities and identifies those that are most relevant to the organization. The CTO's job requires deep knowledge of information technology and the ability to envision and innovate applications for the organization. The CTO's responsibility is to advise the CIO, executive group, and project managers on emerging technologies. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 39) What is the typical structure of an organization's information systems (IS) department? Answer: A typical information systems (IS) department consists of four groups and a data administration staff function. Most IS departments include a technology office that investigates new information systems technologies and determines how an organization can benefit from them. The next group, the operations group, manages the computing infrastructure, including individual computers, in-house server farms, networks, and communications media. The third group in the IS department is development. A development group manages the process of creating new information systems as well as maintaining existing information systems. The last IS department group is outsourcing relations. This group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. The data administration staff function protects data and information assets by establishing data standards and data management practices and policies. However, there are many variations in the structure of the IS department. In larger organizations, the operations group may itself consist of several different departments. Sometimes, there is a separate group for data warehousing and data marts. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
40) What are the responsibilities of the technology office of a firm's information systems (IS) department? Answer: Most information systems (IS) departments include a technology office that investigates new information systems technologies and determines how the organization can benefit from them. For example, today many organizations are investigating social media and elastic cloud opportunities and planning how they can use those capabilities to best accomplish their goals and objectives. An individual called the chief technology officer (CTO) often heads the technology group. The CTO sorts through new ideas and products to identify those that are most relevant to the organization. The CTO's job requires deep knowledge of information technology and the ability to envision and innovate applications for the organization. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 41) Explain the functions of the development group of a firm's information systems (IS) department. Answer: The development group of a firm's information systems (IS) department manages the process of creating new information systems as well as maintaining existing information systems. The size and structure of the development group depends on whether programs are developed in-house. If not, this department will be staffed primarily by business and systems analysts who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. If the organization develops programs in-house, then this department will also include programmers, test engineers, technical writers, and other development personnel. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept 42) Describe the responsibilities of a systems analyst, a computer technician, and a network administrator. Answer: A systems analyst works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine system test plans. A computer technician installs software and repairs computer equipment and networks. A network administrator monitors, maintains, fixes, and tunes computer networks. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.1: What are the functions and organization of the IS department? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
43) In order to accomplish organizational goals and objectives, an organization's information systems (IS) must be aligned with its ________. A) reporting structure B) culture C) competitive strategy D) departments Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 44) Which of the following is true of the alignment between information systems and organizational strategies? A) Information systems must evolve with changes made in organizational strategies. B) The infrastructure of information systems can be easily influenced by strategic changes. C) Integrating different information systems applications with organizational strategies is inexpensive. D) Maintaining the alignment between information systems and strategies is a final process. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 45) A(n) ________ committee is a group of senior managers from the major business functions that works with the chief information officer to set information systems (IS) priorities and decide major IS projects and alternatives. A) enforcement B) disciplinary C) administrative D) steering Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
46) The purpose of an information system is to help an organization accomplish its goals and objectives. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 47) Information Systems (IS) infrastructure is known to be very malleable. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 48) New information systems must be consistent with an organization's goals and objectives. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 49) The membership of a steering committee is determined by the CEO and other members of the executive staff. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 50) What are the different functions in planning the use of information systems? Answer: The information systems (IS) planning functions are: • Align information systems with organizational strategy and maintain alignment as organization changes. • Communicate IS/IT issues to executive group. • Develop/enforce IS priorities within the IS department. • Sponsor steering committee. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 14 Copyright © 2016 Pearson Education, Inc.
51) Explain the advantages of management in outsourcing information systems. Answer: First, outsourcing can be an easy way to gain expertise. Another reason for outsourcing is to avoid management problems. Some companies choose to outsource to save management time and attention. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.2: How do organizations plan the use of IS? Classification: Concept 52) ________ is the process of hiring another organization to perform a service. A) Insourcing B) Outsourcing C) Crowdsourcing D) Open-sourcing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 53) Which of the following is an advantage of outsourcing information systems? A) An outsourcing company is typically in complete control of the process. B) It is a cheaper short-term solution to achieve long-term benefits. C) It can be an easy way to gain expertise otherwise not known. D) The vendors can be easily and cheaply changed if performance is below par. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
54) Which of the following is a risk of outsourcing information systems? A) Vendors can gain access to critical knowledge of the outsourcing company. B) Vendors are not subject to a contractual agreement with the outsourcing company. C) The long-term costs of information systems are outweighed by their benefits. D) Organizations opting for outsourcing cannot gain economies of scale. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 55) ________ refers to the leasing of hardware with preinstalled operating systems. A) Software as a Service (SaaS) B) Outsourcing licensed software C) Platform as a Service (PaaS) D) IaaS cloud hosting Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 56) In ________, hardware and both operating system and application software are leased. A) software as a service (SaaS) B) outsourcing licensed software C) platform as a service (PaaS) D) infrastructure as a service (IaaS) Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 57) Organizations outsource projects to engage its management team in their free time. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 16 Copyright © 2016 Pearson Education, Inc.
58) Gaining economies of scale is an advantage of outsourcing. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 59) Implementation risk is increased by outsourcing information systems (IS) services. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 60) Acquiring licensed software is a form of outsourcing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 61) It is impossible to outsource an entire business function. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 62) Microsoft's Azure is an example of SaaS. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
63) Outsourcing has made in-house information systems (IS)/IT functions obsolete. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 64) In service-oriented outsourcing, a vendor is in the driver's seat. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 65) Each outsource vendor has its own methods and procedures for its services. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 66) An outsource vendor can choose the technology that it wants to implement, unless a contract requires otherwise. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 67) The potential loss of intellectual capital is a concern related to outsourcing. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
68) When a company outsources a system, it has complete control over prioritizing software fixes. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 69) Parting business with an outsource vendor is exceedingly risky. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.3: What are the advantages and disadvantages of outsourcing? Classification: Concept 70) Which of the following is a right of a user of information systems (IS)? A) expecting hand-holding for basic operations B) making hardware modifications to your computer as you see fit C) contributing to requirements for new system features and functions D) receiving repetitive training and support for the same issues Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 71) Which of the following is a responsibility of an information systems (IS) user? A) providing hand-holding for basic operations B) giving repetitive support for the same issue C) authorizing hardware modifications D) following security and backup procedures Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
72) As a user of information systems (IS), an employee has a responsibility to avoid ________. A) unauthorized hardware modifications B) changing system passwords frequently C) backup procedures D) applying software patches Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 73) A user has the right to obtain necessary computing resources to perform his or her work efficiently. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 74) The rights of an information systems user depend on the purpose of a system's usage. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 75) In the context of right to reliable network and Internet services, reliable means that one can use it without problems almost all the time. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
76) Information systems (IS) users have the right to receive effective training in a format convenient to a user. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 77) It is a user's responsibility to install patches and fixes when asked to do so. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 78) The knowledge of responsibilities and duties of an information systems (IS) department helps one become a better consumer of the IS department's services. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept 79) Explain the rights of information systems users. Answer: In relation to the IT department, users have a right to: • have computing resources that allow them to perform their jobs proficiently, reliable network, and Internet services; • a secure computing environment. The organization should protect user's computer and its files, and a user should not normally even need to think about security; • participate in requirements meetings for new applications; and • reliable systems development and maintenance; prompt attention to problems, concerns, and complaints about information services; properly prioritized problem fixes and resolutions; and effective training to use systems to perform their jobs. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept
21 Copyright © 2016 Pearson Education, Inc.
80) Explain the responsibilities of information systems users. Answer: Information systems (IS) users have a responsibility to: • learn basic computer skills; • learn standard techniques and procedures for the applications you use; • follow security and backup procedures; • protect your password(s); • use computers and mobile devices according to your employer's computer use policy; • make no unauthorized hardware modifications; • install only authorized programs; • apply software patches and fixes when directed to do so; • when asked, devote the time required to respond carefully and completely to requests for requirements for new system features and functions; and • avoid reporting trivial problems. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 11.4: What are your user rights and responsibilities? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter 12 Information Systems Development 1) The process of creating and maintaining information systems is called ________. A) systems development B) systems acquisition C) systems definition D) systems configuration Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.1: What is systems development? Classification: Concept 2) When compared to program development, systems development is ________. A) narrower in focus B) less comprehensive C) broader in scope D) more technical Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.1: What is systems development? Classification: Concept 3) Which of the following statements is true of systems development? A) It has little need for human relations skills as tasks are performed by individuals and not by groups. B) It is a technical task undertaken exclusively by programmers and hardware specialists. C) It has lesser scope than computer program development. D) It requires business knowledge and an understanding of group dynamics. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.1: What is systems development? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Which of the following statements is true of information systems? A) They are off-the-shelf software without adaptation. B) They can be adapted to fit business needs. C) They can be purchased as off-the-shelf software. D) They cannot be tailor-made. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.1: What is systems development? Classification: Concept 5) Information systems cannot be tailor-made. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.1: What is systems development? Classification: Concept 6) Information systems involve people and procedures, so they can never be off-the-shelf. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.1: What is systems development? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) What is systems development? How is it different from program development? Answer: Systems development is the process of creating and maintaining information systems. Systems development has a broader scope than computer program development as it involves all five components: hardware, software, data, procedures, and people. Developing a computer program, on the other hand, mostly involves software programs, with some focus on data and databases. Compared to program development, systems development requires more than just programming or technical expertise. Establishing the system's goals, setting up the project, and determining requirements require business knowledge and management skill. Tasks like building computer networks and writing computer programs require technical skills. Creating data models requires the ability to interview users and understand their view of the business activities. Designing procedures, especially those involving group action, requires business knowledge and an understanding of group dynamics. Developing job descriptions, staffing, and training all require human resource and related expertise. Thus, unlike program development, systems development is not an exclusively technical task undertaken by programmers and hardware specialists. Rather, it requires coordinated teamwork of both specialists and nonspecialists with business knowledge. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.1: What is systems development? Classification: Concept 8) Which of the following statements is true of systems development for bigger systems and longer projects? A) Diseconomies of scale are reduced. B) Changes in requirements are increased. C) Average contribution per worker is increased. D) Project budgeting and scheduling becomes easy. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 9) According to Brooks' Law, adding more people to a late project ________. A) makes the project later B) decreases the overall cost C) requires decreased staff coordination D) increases the project's timeline Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
10) According to Brooks' Law, which of the following is a consequence of adding more people to late projects? A) The work allocation per team member increases. B) The costs of training new people can overwhelm the benefits of their contribution. C) Beyond a workgroup of about 20 employees, economies of scale begin to take over. D) It allows the managers to extend the timeline of the project. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 11) Systems development is easy and risk-free. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 12) It is essential to estimate a system's cost to calculate its rate of return. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 13) One of the major challenges in systems development is changing technology. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 14) As development teams become larger, the average contribution per worker decreases. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) Brooks' Law holds true because a larger staff requires decreased coordination. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 16) Why is systems development difficult and risky? Answer: Systems development is difficult and risky because system requirements are often very difficult to determine. Even more difficult, systems development aims at a moving target. Requirements change as the system is developed, and the bigger the system and the longer the project, the more the requirements change. Systems development also faces difficulties in terms of scheduling and budgeting. It is often difficult to estimate the time taken to build a system. It is essential to determine the cost of developing a system, and if labor hours cannot be estimated, labor costs cannot be estimated. Yet another challenge is that while a project is underway, technology continues to change. Unfortunately, as development teams become larger, the average contribution per worker decreases. This is true because as staff size increases, more meetings and other coordinating activities are required to keep everyone in sync. There are economies of scale up to a point, but beyond a workgroup of, say, 20 employees, diseconomies of scale begin to take over. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept 17) Explain how diseconomies of scale can affect systems development. Answer: Unfortunately, as development teams become larger, the average contribution per worker decreases. This is true because as staff size increases, more meetings and other coordinating activities are required to keep everyone in sync. There are economies of scale up to a point, but beyond a workgroup of, say, 20 employees, diseconomies of scale begin to take over. Brooks' Law points out a related problem: Adding more people to a late project makes the project later. Brooks' Law is true not only because a larger staff requires increased coordination, but also because new people need training. The only people who can train the new employees are the existing team members, who are thus taken off productive tasks. The costs of training new people can overwhelm the benefit of their contribution. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.2: Why is systems development difficult and risky? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) The ________ is the traditional process used to develop information systems. A) rapid application development (RAD) B) object-oriented design (OOD) C) systems development life cycle (SDLC) D) extreme programming (XP) Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 19) Which of the following is the first phase of the systems development life cycle? A) requirements analysis B) business planning process C) implementation D) system definition Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 20) In the ________ phase of the systems development life cycle, developers use management's statement of the system needs in order to develop a new information system. A) system definition B) requirements analysis C) component design D) implementation Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
21) In which of the following phases of the systems development life cycle do developers identify the particular features and functions of a new system? A) system definition B) requirements analysis C) component design D) implementation Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 22) The project plan resulting from system definition is the input for requirement analysis. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 23) The goals and scope of a new information system are determined during the requirements analysis phase of the systems development life cycle. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 24) The description of fixes and new requirements is the input to a system maintenance phase of a systems development life cycle. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
25) What are the five phases of the systems development life cycle (SDLC)? Answer: The five phases of the systems development life cycle are (1) system definition, (2) requirements analysis, (3) component design, (4) implementation, and (5) system maintenance. Developers in the first SDLC phase, i.e. system definition, use management's statement of the system needs in order to begin to define the new system (for PRIDE, this statement is based on experience with the prototype). The resulting project plan is the input to the second phase, requirements analysis. Here developers identify the particular features and functions of the new system. The output of that phase is a set of approved user requirements, which become the primary input used to design system components. In phase 4, developers implement, test, and install the new system. Over time, users will find errors, mistakes, and problems. They will also develop new requirements. The description of fixes and new requirements is input into a system maintenance phase. The maintenance phase starts the process all over again, which is why the process is considered a cycle. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.3: What are the five phases of the SDLC? Classification: Concept 26) Which of the following is the first step in defining a new information system? A) Assess the feasibility of the project. B) Explain the goals and scope of the project. C) Determine the schedule and budget for the project. D) Form the project team. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 27) Which of the following steps in the systems definition process aims to eliminate obviously nonsensible projects? A) Define the system goals and scope. B) Form the project team. C) Assess the project feasibility. D) Plan the project requirements. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
28) ________ feasibility concerns whether a new information system fits within a company's customs, culture, charter, or legal requirements. A) Technical B) Cost C) Schedule D) Organizational Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 29) During requirements definition, a development team's composition will be typically heavy with ________. A) systems analysts B) programmers C) business users D) beta testers Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 30) Which of the following statements is true of the composition of a development team over the different phases of the systems development life cycle? A) During conversion, the team will be heavy with database designers. B) During requirements definition, the team will be heavy with testers and database designers. C) During integrated testing and conversion, the team will be augmented with business users. D) During design and implementation, the team will be augmented with business users. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
31) During design and implementation, a development team will be heavy with ________. A) business analysts B) business users C) programmers D) senior managers Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 32) The cost feasibility of a systems development project depends on the scope of the project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 33) Organizational feasibility refers to estimating the time it will take to complete a project. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 34) A development team's composition changes over time. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 35) Business analysts integrate the work of the programmers, testers, and users. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
36) Explain the tasks performed during the system definition phase of the systems development life cycle. Answer: The first step is to define the goals and scope of the new information system. At this step, a development team defines the goal and purpose of the new system. A project's scope is defined by specifying the users who will be involved, or the business processes that will be involved, or the plants, offices, and factories that will be involved. The next step is to assess feasibility. This step answers the question, "Does this project make sense?" The aim here is to eliminate obviously nonsensible projects before forming a project development team and investing significant labor. Feasibility has four dimensions: cost, schedule, technical, and organizational. If the defined project is determined to be feasible, the next step is to form the project team. Typical personnel on a development team are a manager, systems analysts, business analysts, programmers, software testers, and users. The first major task for the assembled project team is to plan the project. Members of the project team specify tasks to be accomplished, assign personnel, determine task dependencies, and set schedules. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 37) Define the terms cost feasibility, technical feasibility, and organizational feasibility. Answer: Cost feasibility approximates total costs and compares it to system value. Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system. Organizational feasibility concerns whether the new system fits within the organization's customs, culture, charter, or legal requirements. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
38) Who are the members of a systems project team? Explain the roles of business analysts and systems analysts. Answer: Typical personnel on a development team are a manager (or managers for larger projects), business analysts, systems analysts, programmers, software testers, and users. Business analysts specialize in understanding business needs, strategies, and goals and helping businesses implement systems to accomplish their competitive strategies. Systems analysts are IT professionals who understand both business and technology. Systems analysts are closer to IT and are a bit more technical, though there is considerable overlap in the duties and responsibilities of business and systems analysts. Both are active throughout the systems development process and play a key role in moving a project through the systems development process. Business analysts work more with managers and executives; systems analysts integrate the work of the programmers, testers, and users. Depending on the nature of the project, the team may also include hardware and communications specialists, database designers and administrators, and other IT specialists. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.4: How is system definition accomplished? Classification: Concept 39) Which of the following is the most important phase in the systems development process? A) Define the goals and scope of the new information system. B) Implement the information system. C) Determine the system's requirements. D) Adapt systems to changes in requirements. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 40) If a new system involves a new database or substantial changes to an existing database, then the development team will have to create a(n) ________. A) data model B) replica C) archetype D) test plan Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
41) The easiest and cheapest time to alter an information system is in the ________ phase of the systems development life cycle. A) requirements analysis B) system definition C) component design D) implementation Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 42) Which of the following is a typical concern for developers while using prototypes? A) comparing a system's features with requirements B) understanding a system's complete requirements C) assessing a system's technical feasibility D) developing a uniform funding solution for the system Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 43) Interviews are conducted with system users in the requirements analysis phase of the systems development life cycle. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 44) The security needs of an information system are determined during the component design phase of the systems development life cycle. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
45) Mock-ups of forms and reports can generate similar benefits as a working prototype. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 46) Explain the importance of the requirements analysis phase of the systems development life cycle (SDLC). Answer: Determining the system's requirements is the most important phase in the systems development process. If the requirements are wrong, the system will be wrong. If the requirements are determined completely and correctly, then design and implementation will be easier and more likely to result in success. Examples of requirements are the contents and the format of Web pages and the functions of buttons on those pages, or the structure and content of a report, or the fields and menu choices in a data entry form. Security is another important category of requirements. The easiest and cheapest time to alter the information system is in the requirements phase. Changing a requirement at this stage is simply a matter of changing a description. Changing a requirement in the implementation phase may require weeks of reworking applications components and the database. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.5: What is the users' role in the requirements phase? Classification: Concept 47) While designing ________, a development team must produce design documentation for writing program code. A) off-the-shelf with alteration software B) custom-developed programs C) off-the-shelf software D) cloud-based programs Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.6: How are the five components designed? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
48) Procedures for a business information system are designed usually by ________. A) testers B) programmers C) systems analysts D) business analysts Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.6: How are the five components designed? Classification: Concept 49) Normal processing procedures for operations personnel involve procedures for ________. A) continuing operations when the system fails B) backing up data and other resources C) using the system to accomplish business tasks D) starting, stopping, and operating the system Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.6: How are the five components designed? Classification: Concept 50) In terms of software design for custom-developed programs, a development team identifies off-the-shelf products and then determines the alterations required. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.6: How are the five components designed? Classification: Concept 51) Explain how the software component of an information system is designed. Answer: Software design depends on the source of the programs. For off-the-shelf software, the team must determine candidate products and evaluate them against the requirements. For off-theshelf with alteration software, the team identifies products to be acquired off-the-shelf and then determines the alterations required. For custom-developed programs, the team produces design documentation for writing program code. For a cloud-based system, one important design decision is where application processing will occur. All can occur on mobile devices, all can occur on cloud servers, or a mixture can be used. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.6: How are the five components designed? Classification: Concept 15 Copyright © 2016 Pearson Education, Inc.
52) During the ________ phase of the systems development life cycle process, developers construct, install, and test the components of the information system. A) requirements analysis B) database design C) feasibility assessment D) implementation Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 53) A comprehensive test plan should ________. A) not include incorrect actions that users take B) cause every line of program code to be executed C) cause only critical error messages to be displayed D) be constructed by only product quality assurance (PQA) personnel Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 54) Which of the following personnel in a development team has the final say on whether a system is ready for use? A) managers B) systems analysts C) users D) PQA personnel Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
55) ________ testing is the process of allowing future system users to try out a new system on their own. A) Unit B) Alpha C) Integration D) Beta Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 56) System ________ refers to the process of changing business activity from an old information system to a new system. A) definition B) testing C) analysis D) conversion Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 57) In a ________ installation, an organization implements an entire system on a limited portion of the business. A) phased B) parallel C) pilot D) plunge Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
58) In a ________ installation, a new system runs alongside the old one until the new one has been tested and is fully operational. A) pilot B) parallel C) phased D) plunge Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 59) Olive Inc., a chain of retail outlets, is converting its existing billing systems to a more robust online tool. In this process, the organization runs both the old and the new systems to compare their performances. In this case, the company is implementing the new system using ________ installation. A) parallel B) pilot C) plunge D) phased Answer: A AACSB: Information Technology Difficulty: Difficult Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Application 60) Which of the following is the most expensive style of system conversion? A) pilot installation B) phased installation C) parallel installation D) plunge installation Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept
18 Copyright © 2016 Pearson Education, Inc.
61) Which of the following styles of system conversion shuts off the old system and starts a new system? A) plunge installation B) parallel installation C) pilot installation D) phased installation Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 62) Testing is often called product quality assurance (PQA). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 63) Beta testing is the last phase of a testing process. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 64) In pilot installation, a new system is installed in phases across an organization. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 65) Plunge installation is sometimes called direct installation. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept
19 Copyright © 2016 Pearson Education, Inc.
66) What is a test plan? Answer: Once developers have constructed and tested all of the system components, they integrate the individual components and test the system. Software and system testing are difficult, time-consuming, and complex tasks. Developers need to design and develop test plans and record the results of tests. A test plan consists of sequences of actions that users will take when using the new system. Test plans include not only the normal actions that users will take, but also incorrect actions. A comprehensive test plan should cause every line of program code to be executed. The test plan should cause every error message to be displayed. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 67) What is beta testing? Answer: Beta testing is the process of allowing future system users to try out the new system on their own. Software vendors, such as Microsoft, often release beta versions of their products for users to try and to test. Such users report problems back to the vendor. Beta testing is the last stage of testing. Normally, products in the beta test phase are complete and fully functioning; they typically have few serious errors. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept 68) What are the four ways in which organizations can implement a system conversion? Answer: Organizations can implement a system conversion in one of four ways. In a pilot installation, an organization implements the entire system on a limited portion of the business. In a phased installation, a new system is installed in phases across the organization. With parallel installation, a new system runs in parallel with the old one until the new system is tested and fully operational. The final style of conversion is plunge installation (sometimes called direct installation). With it, an organization shuts off the old system and starts the new system. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.7: How is an information system implemented? Classification: Concept
20 Copyright © 2016 Pearson Education, Inc.
69) Software developers group the fixes for high-priority failures into a group that can be applied to all copies of a given product called a ________. A) service pack B) bug C) patch D) product key Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 70) Which of the following statements is true of system maintenance? A) Software developers usually bundle fixes for low-priority problems into a patch. B) Information systems (IS) personnel prioritize system problems on a first-come-first-served basis. C) All commercial software products are shipped with known failures. D) Service packs are developed to fix a single problem at a time. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 71) Software vendors usually bundle fixes of low-priority problems into larger groups called ________. A) patches B) service packs C) bugs D) product keys Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 72) The maintenance phase can start another cycle of the systems development life cycle (SLDC). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 21 Copyright © 2016 Pearson Education, Inc.
73) What are the tasks of system maintenance? Answer: The last phase of the systems development life cycle (SDLC) is maintenance. Maintenance is a misnomer; the work done during this phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. First, there needs to be a means for tracking both failures and requests for enhancements to meet new requirements. For small systems, organizations can track failures and enhancements using word-processing documents. Typically, IS personnel prioritize system problems according to their severity. They fix highpriority items as soon as possible, and they fix low-priority items as time and resources become available. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 74) What are patches and service packs? Answer: Patches are group fixes for high priority failures that can be applied to all copies of a given product. Software vendors supply patches to fix security and other critical problems. They usually bundle fixes of low-priority problems into larger groups called service packs. Users apply service packs in much the same way that they apply patches, except that service packs typically involve fixes to hundreds or thousands of problems. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 12.8: What are the tasks for system maintenance? Classification: Concept 75) Which of the following is a major concern for developers in a systems development life cycle process? A) having to work with a team of specialists B) moving through the unstructured phases of the cycle C) agreeing on the basic tasks to be performed to build a system D) performing repetitive tasks of a completed phase Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept
22 Copyright © 2016 Pearson Education, Inc.
76) Projects are said to be in analysis paralysis if so much time is spent ________. A) in the system definition phase of the systems development life cycle (SDLC) B) on project scheduling C) documenting the requirements D) designing the system components Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept 77) The systems development life cycle process is supposed to operate in a sequence of nonrepetitive phases. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept 78) Actual systems development generally works in accordance with the waterfall nature of the systems development life cycle. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept 79) Estimates of labor hours and completion dates are accurate for large, multiyear projects. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different methods for developing information systems. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept
23 Copyright © 2016 Pearson Education, Inc.
80) Explain the problems caused due to the waterfall nature of systems development life cycle. Answer: One of the reasons for SDLC problems is due to the waterfall nature of the SDLC. Like a series of waterfalls, the process is supposed to operate in a sequence of nonrepetitive phases. For example, the team completes the requirements phase and goes over the waterfall into the design phase, and on through the process. Unfortunately, systems development seldom works so smoothly. Often, there is a need to crawl back up the waterfall, if you will, and repeat work in a prior phase. Most commonly, when design work begins and the team evaluates alternatives, they learn that some requirements statements are incomplete or missing. At that point, the team needs to do more requirements work, yet that phase is supposedly finished. On some projects, the team goes back and forth between requirements and design so many times that the project seems to be out of control. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 12.9: What are some of the problems with the SDLC? Classification: Concept
24 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 1 Collaboration Information Systems for Decision Making, Problem Solving, and Project Management 1) ________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Abstract reasoning B) Systems thinking C) Collaboration D) Dissolution Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 2) Which of the following should be followed for an effective collaboration? A) Iterations should be avoided for the smooth functioning of a collaborative process. B) Group members should not review each other's work negatively. C) Multiple iterations and feedback should be used to improve collaboration. D) Collaboration should take place at the final stage of a project to be more effective. Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 3) In collaboration, the work proceeds in a series of steps in which one person produces something, others criticize it, and then a revised version is produced. These steps are known as ________. A) iterations B) alternatives C) redundancies D) strategies Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) How do group iterations and feedback provide better results than those provided by a single individual? A) They motivate the members of a group to work on individual goals. B) They allow individuals to put forth different perspectives. C) They encourage the members of a group to share ideas and collaborate at the end of a project. D) They restrict individuals from criticizing one another's perspectives. Answer: B AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 5) Which of the following is necessary for a collaboration to be successful? A) Members should resist putting forward unpopular ideas. B) Members should avoid entering into difficult conversations. C) Members should provide and receive critical feedback. D) Members should be very polite and not say anything critical. Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 6) Which of the following should be avoided for a collaboration to be successful? A) replying to the criticisms offered by different members in the group B) giving different perceptions of the topics under discussion C) giving critical feedback against other members of a group D) giving critical feedback that leads to distrust among group members Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Listed below are perspectives of different people working as a team. Which of the following approaches to teamwork will provide the best results? A) Sarah disagrees with the project plan but does not voice her opinion because she doesn't want to disrupt the functioning of the team. B) Andrew believes that conflict is healthy for teamwork and doesn't hesitate to criticize the shortcomings of his coworkers' perceptions. C) Caleb and Adam hold opposing political views but do not discuss their opinions while working so that other team members aren't distracted. D) Daniel is the team leader and discourages disagreements among team members so that the project can proceed faster. Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Application 8) Which of the following guidelines must be followed to provide and receive critical feedback? A) Make personal comments. B) Give specific details. C) Avoid suggestions. D) Dominate the group. Answer: B AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 9) A cooperative result is usually better in quality than the result of someone working alone. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 10) Multiple versions of a document are created when a group of people collaboratively work on it to achieve a common goal. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) An extremely critical group cannot collaborate effectively. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 12) It is important for team members to have different ideas and opinions and to express them to each other. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 13) Differentiate between cooperation and collaboration with examples. Answer: Cooperation is defined as a group of people working together, all doing essentially the same type of work, to accomplish a job. Collaboration is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. For example, when a group of five students is given an assignment, they will break it up into five pieces, work to accomplish their piece independently, and then merge their independent work for grading by the professor. Using this practice, the students work cooperatively as a group. In contrast, when students work collaboratively, they set forth an initial idea or work product, provide feedback to one another on those ideas or products, and then revise in accordance with feedback. AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.1: What are the two key characteristics of collaboration? Classification: Concept 14) Which of the following is a primary criterion for judging team success? A) changes in organizational structure B) growth in team capacity C) working in a series of stages D) meaningful and satisfying experience Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.2: What are three criteria for successful collaboration? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) Business professionals are primarily concerned about the successful outcome of collaboration. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.2: What are three criteria for successful collaboration? Classification: Concept 16) Explain the three primary criteria for successful collaboration. Answer: The three primary criteria for successful collaboration are: 1. Successful outcome: Most students are primarily concerned with this criterion. They want to achieve a good outcome, measured by their grade, or they want to get a project done with an acceptable grade while minimizing the effort required. For business professionals, teams need to accomplish their goals. 2. Growth in team capability: Most student teams are short-lived. But, in business, teams often last months or years. With experience, teams can become more effective. Activities are combined or eliminated. Teams also get better as individuals improve at their tasks. Part of that improvement is the learning curve; as someone does something over and over, he or she gets better at it. Team members teach task skills and impart knowledge to one another. Team members also provide perspectives that other team members need. 3. Meaningful and satisfying experience: The nature of team goals is a major factor in making work meaningful. If an individual's work is not only perceived as important, but the person doing that work is also given credit for it, then the experience will be perceived as meaningful. So, recognition for work well done is vitally important for a meaningful work experience. AACSB: Interpersonal Relations and Teamwork Difficulty: Difficult Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.2: What are three criteria for successful collaboration? Classification: Concept 17) ________ is the first and most fundamental collaboration purpose. A) Decision making B) Informing C) Managing projects D) Experimenting Answer: B AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) Being informed is considered the most fundamental collaboration purpose because ________. A) individuals can construct different perceptions of the same data B) all the members of a team usually perceive information in the same way C) members will be able to avoid critical feedbacks D) conflicting ideas can be eliminated Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 19) ________ decisions are those that support day-to-day activities, such as the number of widgets to order from a particular vendor. A) Managerial B) Tactical C) Strategic D) Operational Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 20) ________ decisions are decisions about the allocation and utilization of resources. A) Behavioral B) Operational C) Managerial D) Strategic Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
21) ________ decisions are those that support broad-scope, organizational issues. A) Strategic B) Behavioral C) Operational D) Managerial Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 22) Which of the following statements is true of a structured decision process? A) There is an understood and accepted method for making such a decision. B) Collaboration is often required in this process. C) The nature of an underlying problem is given more importance in this type of decisionmaking process. D) The decisions taken depend largely on the manner in which managers make assessments. Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 23) Which of the following statements is true of an unstructured decision process? A) Collaboration is seldom required in this process. B) Individuals use a standardized decision process to assess a situation. C) Individuals vary in the manner in which they make decisions in this process. D) There is an understood and accepted method for making decisions. Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
24) In project management, setting the ground rules for a project and its team is the fundamental purpose of the ________ phase. A) finalizing B) starting C) executing D) planning Answer: B AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 25) Which of the following tasks is performed during the starting phase of project management? A) preparing archival documents B) managing tasks and budget C) establishing team rules D) determining project schedule Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 26) Based on the phases of project management, the ________ stage is characterized by defining activities, assigning personnel and budget to those activities, and determining project schedule. A) finalizing B) starting C) doing D) planning Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
27) Hanna, a project manager at Rinehart Inc., adds additional resources to a new project that has insufficient resources to meet its tight schedules. In this case, Hanna is in the ________ phase of project management. A) planning B) starting C) doing D) finalizing Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Difficult Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Application 28) In project management, accomplishing tasks on time is the objective of the ________ phase. A) finalizing B) starting C) doing D) planning Answer: C AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 29) Rochelle, a senior program analyst in Levy Inc., reschedules various tasks assigned to her subordinates in order to meet a project's new guidelines. In this case, Rochelle is in the ________ phase of project management. A) starting B) doing C) planning D) finalizing Answer: B AACSB: Analytical Thinking Difficulty: Difficult Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Application
9 Copyright © 2016 Pearson Education, Inc.
30) The ________ phase of project management requires a team to document its results, document information for future teams, close down the project, and disband the team. A) finalizing B) starting C) doing D) planning Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 31) Which of the following tasks is performed during the finalizing phase of project management? A) solving problems B) documenting and reporting project progress C) revising budget D) preparing archival documents Answer: D AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 32) Operational decisions are always collaborative. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 33) Strategic decisions are almost always collaborative. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
34) Decisions at the operational level tend to be unstructured. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 35) Different people usually perceive a problem in the same way. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 36) The first and most important task for a problem-solving collaborative group is to define the problem. Answer: TRUE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 37) Team roles, responsibilities, and authorities are established during the planning phase of project management. Answer: FALSE AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
38) What are the three levels of decision making? Answer: Decisions are made at three levels: 1. Operational decisions: Decisions that support operational, day-to-day activities are called operational decisions. Typical operational decisions are: How many widgets should we order from vendor A? Should we extend credit to vendor B? In almost all cases, operational decisions need not involve collaboration. 2. Managerial decisions: Decisions that deal with the allocation and utilization of resources are called managerial decisions. Typical managerial decisions are: How much should we budget for computer hardware and programs for department A next year? How many engineers should we assign to project B? In general, if a managerial decision requires consideration of different perspectives, then it will benefit from collaboration. 3. Strategic decisions: Decisions that support broad-scope, organizational issues are called strategic decisions. Typical strategic decisions at the strategic level are: Should we start a new product line? Should we open a centralized warehouse in Tennessee? Should we acquire company A? Strategic decisions are almost always collaborative. AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept 39) Explain the four phases of project management. Answer: The four phases of project management are: 1. Starting phase: The fundamental purpose of the starting phase is to set the ground rules for the project and the team. Other tasks during the starting phase are to set the scope of the project and to establish an initial budget. 2. Planning phase: The purpose of the planning phase is to determine "who will do what and by when." Work activities are defined, and resources such as personnel, budget, and equipment are assigned to them. Tasks often depend on one other. The project budget is usually revised during the planning phase as well. 3. Doing phase: Project tasks are accomplished during the doing phase. The key management challenge here is to ensure that tasks are accomplished on time, and, if not, to identify schedule problems as early as possible. As work progresses, additional trade-offs must be made, and often it is necessary to add or delete tasks, change task assignments, add or remove task labor or other resources, and so forth. Another important task is to document and report project progress. 4. Finalizing phase: In this phase, the team needs to document its results, document information for future teams, close down the project, and disband the team. AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.3: What are the four primary purposes of collaboration? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
40) Which of the following statements is true of project data? A) It is a part of the collaboration's work product. B) It is data that is used to manage the project. C) It includes schedules, tasks, budgets, and other related data about a project. D) It is not subject to iteration and feedback. Answer: A AACSB: Interpersonal Relations and Teamwork Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept 41) Which of the following collaborative activities requires tracking many versions of many documents and other work products? A) increase in team satisfaction B) feedback C) promotion of team growth D) iteration Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept 42) Which of the following collaborative activities requires providing easy-to-use and readily available multiparty communication? A) promotion of team growth B) feedback C) accomplishment of task within time and budget D) iteration Answer: B AACSB: Interpersonal Relations and Teamwork Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
43) Most collaboration systems are hosted on client computers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept 44) Schedules, tasks, budgets, and other managerial data are examples of project metadata. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept 45) The primary function of a collaboration information system is information security. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept 46) Differentiate between project data and project metadata. Answer: Project data is data that is part of the collaboration's work product. For example, for a team that is designing a new product, design documents are examples of project data. A document that describes a recommended solution is project data for a problem-solving project. Project metadata is data that is used to manage the project. Schedules, tasks, budgets, and other managerial data are examples of project metadata. Both types of data are subject to iteration and feedback. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 13.4: What are the components and functions of a collaboration information system? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 2 Collaborative Information Systems for Student Projects 1) ________ are useful when a team needs to meet on some topic but everyone cannot meet at the same time. A) Blogs B) Discussion forums C) Wikis D) Surveys Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.1: What are the IS requirements for student project collaborations? Classification: Concept 2) Discussion forums are one of the nice-to-have features in a collaboration tool. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.1: What are the IS requirements for student project collaborations? Classification: Concept 3) Why should a team choose to use a collaboration information system? Answer: Collaboration is critical in business, and numerous software vendors and open source developers have created computer programs to facilitate various collaborative tasks. Once a team learns how to use the tools and has developed procedures for using them, teamwork will be easier. The team will no longer need to get everyone together face-to-face. It will no longer lose documents; it will be able to determine who is contributing and who is not. Another reason for using collaboration tools is that it will create better results. Such systems facilitate feedback and iteration. Each team member can produce documents, and others can comment and make revisions to them. AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.1: What are the IS requirements for student project collaborations? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Synchronous communication is said to occur if ________. A) communication occurs between people in different time zones B) there is a flow of communication according to the hierarchical structure C) members of various teams work on the same task D) all members of a team meet at the same time Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 5) Which of the following is an example of synchronous communication? A) email B) team survey C) multiparty text chat D) discussion forum Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 6) ________ communication occurs when team members do not meet at the same time. A) Asynchronous B) Synchronous C) Procedural D) Nonprocedural Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 7) Which of the following is an example of asynchronous communication? A) multiparty text chat B) videoconferencing C) email D) webinar Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
8) If participants do not meet in the same place, and possibly not at the same time, it can be regarded as a ________ meeting. A) concurrent B) parallel C) synchronous D) virtual Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 9) If a virtual meeting is synchronous, participants can interact with each other through ________. A) discussion forums B) videoconferencing C) email D) team surveys Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 10) ________ are virtual meetings in which attendees view one of the attendees' computer screens for formal and organized presentations. A) Discussion forums B) Screen-sharing applications C) Conference calls D) Webinars Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) ________ is a type of asynchronous communication in which a group member can post an entry, an idea, a comment, or a question, and other group members respond to it later, at their convenience. A) Multiparty text chat B) Videoconferencing C) Webinar D) Discussion forum Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 12) ________ is a type of asynchronous communication where one person creates a list of questions to which other users respond. A) Multiparty text chat B) Team survey C) Webinar D) Whiteboard Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 13) Asynchronous communication occurs when team members do not meet at the same time. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 14) A face-to-face meeting is an example of asynchronous communication. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) Virtual meetings can be synchronous or asynchronous. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 16) Wikis are a virtual meeting in which attendees view one of the attendees' computer screens for a more formal and organized presentation. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 17) Videoconferencing is likely to be less intrusive than text chat. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 18) Email is a tool used for synchronous communication. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 19) In team surveys, one team member creates a list of questions and the other team members respond. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
20) Explain synchronous and asynchronous communications in organizations with examples. Answer: Synchronous communication occurs when all team members meet at the same time. Face-to-face meetings and conference calls are examples of synchronous communication. Asynchronous communication occurs when team members do not meet at the same time. Email, discussion forums, and team surveys are examples of asynchronous communication. Virtual meetings in which participants do not meet in the same place and possibly not at the same time can be both synchronous and asynchronous. If the virtual meeting is synchronous (all meet at the same time), participants can use conference calls, webinars, or multiparty text chat. A webinar is a virtual meeting in which attendees view one of the attendees' computer screens for a more formal and organized presentation. Videoconferencing is another synchronous method. When a team must meet asynchronously, most members try to communicate via email. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.2: How can you use collaboration tools to improve team communication? Classification: Concept 21) Which of the following is a content sharing technique which is least effective for collaborations in which there are many document versions or for which there is a desire for content control? A) email with attachments B) Microsoft SharePoint C) Google Docs D) file server Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 22) Which of the following statements is true of shared content with version management? A) Content sharing methods that provide version management cannot accommodate concurrent work. B) Version management systems provide version control. C) Version management makes it impossible to know when and by whom the document was changed. D) Content sharing systems that provide version management can track changes to documents. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
23) Which of the following tools helps share content with version management features? A) Skype B) Google Docs C) emails with attachments D) file server Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 24) Which of the following statements is true of Google Drive? A) Users receive an email when a document is made available to them. B) Documents are stored on the Google Drive server. C) Document revisions are tracked with extensive details of changes made. D) Microsoft Excel documents cannot be uploaded to Google Drive. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 25) Which of the following systems provides version control while sharing content? A) Microsoft SharePoint B) LinkedIn C) emails with attachments D) locked files hard disks Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) In version control systems, shared documents are placed into shared directories called ________. A) vaults B) libraries C) workspaces D) records Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 27) Which of the following statements is true of Microsoft SharePoint? A) It does not facilitate permission-limited activity. B) It converts shared documents to the Google Docs format. C) It facilitates the continuation of workflow defined for a document even when any of its members disapproves the document. D) It does not allow users to edit a document if it has been checked out by another user. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 28) The degree of version management is very high in email with attachments. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 29) Storing documents on servers is better than using email attachments because documents have a single storage location. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
30) Version management systems facilitate tracking changes to documents and provide features and functions to accommodate concurrent work. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 31) A Google account or a Gmail account is not essential to access Google Drive. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 32) Version management systems provide version control. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 33) In version control systems, shared documents are placed in shared directories, sometimes called libraries. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 34) The document checkout feature in SharePoint allows users to simultaneously edit documents. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
35) Workflows cannot be defined on Microsoft SharePoint for multistage business processes. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 36) What is version management and why is it important? Answer: Every collaborative project involves sharing of content. Although email is simple, easy, and readily available, it will not suffice for collaborations in which there are many document versions or for which there is a desire for content control. Storing documents on servers is better than using email attachments because documents have a single storage location. They are not scattered in different team members' email boxes. However, without any version management it will be impossible to know who changed the document and when. Version management is a technique used for sharing electronic content. Systems that provide version management track changes to documents and provide features and functions to accommodate concurrent work. Google Drive and Microsoft One Drive are examples of systems that provide version management. AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept 37) Explain version control with a simple example. Answer: Version control is the process of limiting the actions that can be taken by a particular user on shared documents. Version management systems improve the tracking of shared content and potentially eliminate problems caused by concurrent document access. They do not, however, provide version control. With version control systems, each team member is given an account with a set of permissions. Shared documents are placed into shared directories, which are sometimes called libraries. Furthermore, document directories can be set up so that users are required to check out documents before they can modify them. When a document is checked out, no other user can obtain it for the purpose of editing it. Once the document has been checked in, other users can obtain it for editing. Microsoft SharePoint is the most popular version control application for general business. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.3: How can you use collaboration tools to share content? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Which of the following statements is true of collaboration tools? A) Team members cannot request SharePoint to send emails when certain events occur. B) Google Grid permits only the uploader to make changes to a task list and does not allow simultaneous edits. C) The standard task list in SharePoint can readily be modified to include user-customized columns using SharePoint. D) Google Grid allows only one user to edit a document at a time. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept 39) Which of the following statements is true of Google Grid? A) It restricts the edit permission on documents to the creator of tasks. B) It does not allow simultaneous edits. C) It deals with video and audio files. D) It provides version history showing the changes made by users to task lists. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept 40) The alerts feature in SharePoint ________. A) sends a team member an email whenever a task is assigned to him or her B) requires team members to check the task list for new tasks every hour C) does not support customization of email requests D) can send emails only when an existing task is deleted Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept 41) SharePoint can be configured to send email alerts when certain events occur. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) SharePoint includes a built-in content type for managing task lists that provides robust and powerful features. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept 43) Explain the importance of Microsoft SharePoint in task management. Answer: Microsoft SharePoint has a robust task management capability. It contains a built-in content type for managing task lists that provides powerful features. The standard task list stores data such as title, assigned to, due date, status, predecessors, and other useful task data. Users can also add their own data to the default format of the task list. With SharePoint, it is possible to filter task lists to show only incomplete tasks, or only tasks that have been completed. Alerts are a feature in SharePoint task lists that can send emails to a team member when certain events occur. If a task is assigned to a person, alerts can send an email. This feature means that team members need not continually check the task list for new tasks. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.4: How can you use collaboration tools to manage tasks? Classification: Concept 44) With the ________ collaboration tool set, a participant should be able to collaborate with his or her team, though he or she will get little support from the software. A) Minimal B) Optimal C) Good D) Comprehensive Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
45) With the ________ collaboration tool set, participants have the ability to conduct multiparty audio and video virtual meetings and the support for concurrent access to document, spreadsheet, and presentation files, but they will have to rely on third-party tools to use surveys, wikis, and blogs. A) Minimal B) Optimal C) Good D) Comprehensive Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 46) The ________ collaboration tool set has a large set of features, including content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. A) Minimal B) Basic C) Good D) Comprehensive Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 47) Which of the following statements is true of collaboration tool sets? A) The Good collaboration tool set has built-in discussion boards. B) The Comprehensive collaboration tool set takes the longest time to learn. C) The Good collaboration tool set includes workflow control as an inbuilt feature. D) The Minimal collaboration tool set allows sharing of video files. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
48) Which of the following statements is true of a product power curve for collaborative tool sets? A) A flat line on a power curve means the user is increasing the utility gained from the product. B) At time zero, the ideal power curve is at zero. C) The power curve of a Minimal collaboration tool set rises steadily with time. D) The power curve of a Comprehensive collaboration tool set has a longer flat spot in the beginning. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 49) With the Minimal collaboration tool set, a participant should be able to collaborate with his or her team, though he or she will get little support from the software. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 50) The Good collaboration tool set includes content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 51) In the product power curve, the Minimal product set has some power at time zero. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
52) While using the Minimal collaboration tool set, it must be ensured that one user's work does not conflict with another's. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept 53) What are the three sets of collaboration tools? Answer: The three sets of collaboration tools are the Minimal, Good, and Comprehensive tool sets. Their features are as follows: 1. The Minimal collaboration tool set has the minimum possible set of tools. With this set, a participant should be able to collaborate with his or her team, though he or she will get little support from the software. 2. With the Good collaboration tool set, a participant will have the ability to conduct multiparty audio and video virtual meetings, and he or she will also have support for concurrent access to document, spreadsheet, and presentation files. 3. The Comprehensive collaboration tool set has a full set of features, including content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can enhance systems of collaboration and teamwork. Learning Obj: LO 14.5: Which collaboration information system is right for your team? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 3 Mobile Systems 1) ________ systems are information systems that support users in motion. A) Data B) Mobile C) Remote D) Web-based Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept 2) Which of the following is a major element of mobile systems? A) wired connectivity B) users in specific location C) cloud-based resources D) stationary devices Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept 3) Which of the following is a characteristic of a mobile device? A) It restricts data entry. B) It is a high power-consuming computing device. C) It is not capable of wireless connectivity. D) It is a small and lightweight device. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Mobile systems are information systems that support users in motion. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept 5) Mobile systems users only move geographically, not from device to device. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept 6) A mobile device is a small, lightweight, power-conserving computing device that is capable of wireless connectivity. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept 7) What are mobile systems? Answer: Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place—at home, at work, while traveling—using any smart device, such as smartphone, tablet, or PC. Mobile systems users move not only geographically, they also move from device to device. The major elements in a mobile system are users in motion, mobile devices, wireless connectivity, and cloud-based resources. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.1: What are mobile systems? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) In the context of industry changes, which of the following statements is true of mobile systems? A) They consist of data that create a premium on the ability to memorize vast quantities of product data. B) The scope of advertising is high. C) The usage of mobile systems results in organizations being effective with part-time employees and independent contractors. D) They consist of data that remove the premium for the ability to access, query, and present the data. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.2: Why are mobile systems important? Classification: Concept 9) Which of the following is true about the impact of mobile systems on data usage in information systems? A) More advertisements can be shown. B) Less device real estate C) Quantity of data available has been reduced. D) Organizations' data is securely stored. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.2: Why are mobile systems important? Classification: Concept 10) The impact of the growth of mobile systems led to greater sales of mobile devices with compact interface and new technology. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.2: Why are mobile systems important? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Briefly describe the mobile system effect for each of the five components of an information system. Answer: The five components of an information system are: hardware, software, data, procedures, and people. The impact of mobile system growth on each of these components is as follows: Hardware: The increasing demand of mobile systems means sales of many more mobile devices, at the expense of PC sales. Software: The reduced size of mobile devices requires the invention of new, innovative, and compact interfaces. Applications will need to scale with the invention of new technology for active users. Data: Many more mobile systems mean an incredible amount of new data used to create much more information. Mobile systems can cause organizations to lose control over their data. Data leakage is inevitable. Procedures: Mobile systems are always on, and people who use mobile systems are equally always at work. Employee lifestyle becomes a hybrid of personal and professional. People: Mobile systems increase the speed of business, giving an advantage to those who can nimbly respond to changing conditions and succeed with the unexpected. Ability to thrive in a dynamic environment is more important. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.2: Why are mobile systems important? Classification: Concept 12) A ________ application is a thick-client application that is designed to work with a particular operating system, and sometimes only with a particular mobile device that runs that operating system. A) native B) virtual C) remote D) browser-based Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
13) In a ________ application, the browser provides a relatively consistent platform for the application. A) virtual B) native C) thick-client D) Web Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 14) ________ languages can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change. A) Assembly B) Data-oriented C) Object-oriented D) Hardware description Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 15) Which of the following statements about native applications is true? A) They are developed by amateur programmers and business professionals. B) They use HTML5, CSS3, and JavaScript as development languages. C) They only run on the operating system for which they are programmed. D) They are dependent on platforms provided by browsers. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
16) Web applications can be developed by less-skilled, lesser-paid employees; they are considerably cheaper to develop than ________ applications. A) thin-client B) user-code C) remote D) native Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 17) Web mobile applications ________. A) are limited by the capabilities of the browser B) are developed by professional programmers only C) run only on the operating system for which they are programmed D) are usually developed using Objective-C, Java, or VB.Net Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 18) Which of the following development languages is used in web mobile applications? A) VB.Net B) HTML5 C) C++ D) Objective-C Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
19) Which of the following statements is true of Web applications developed for mobile systems? A) They can be developed by professional programmers and technically oriented Web developers or business professionals. B) They are more expensive than native applications of equivalent complexity. C) It is easier to earn money from a thin-client application. D) Thin-client applications require multiple versions. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 20) A browser provides a more-or-less consistent environment for a Web application when it is developed to be run outside the browser. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 21) The cost of native applications is very low when compared to Web applications. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 22) A native application is a thick-client application that is designed to work with a particular operating system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 23) Native mobile applications only run on the operating system for which they are programmed. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 7 Copyright © 2016 Pearson Education, Inc.
24) Native mobile applications can be developed by technically oriented Web developers and business professionals. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 25) Professional programming languages such as Objective-C and VB.Net are preferred to develop Web mobile applications. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 26) The advantages of using the HTML5 version of Web application are the support for graphics, animation, 2D animations, and other sophisticated user experiences. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 27) Web applications are limited by the capabilities of the browser. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 28) The major advantage of native applications over Web applications is that they will run on any operating system and mobile device. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) Unlike native applications, Web applications have one code base and one development team. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 30) Differentiate between native and Web mobile applications. Answer: Native mobile applications are developed using serious, heavy-duty, professional programming languages such as Objective-C, Java, and VB.Net. All of these languages are object-oriented, which means they can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change. Object-oriented languages can only be used by professional programmers who have devoted years to learning object-oriented design and coding skills. The downside of native applications is that they only run on the operating system for which they are programmed. As a general rule, the cost of native applications is high. Web development languages are HTML5, CSS3, and Java Script. Web applications can be written by professional programmers. However, it is possible for technically oriented Web developers and business professionals to develop them as well. Web applications are limited by the capabilities of the browser. While browsers are becoming increasingly sophisticated, they cannot offer the full capabilities of the underlying operating system and hardware. The major advantage of webs over native applications is that they will run on any operating system and mobile device. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.3: How do native and Web-based mobile applications compare? Classification: Concept 31) Which of the following is true of quality mobile user experiences? A) Users' content must occupy limited display space on mobile systems. B) Use of content to drive application behavior is called indirect interaction. C) Applications must be designed to one scale, so that they fit one particular display appropriately. D) Power usage on mobile devices can be minimized by moving complex code to cloud servers. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
32) ________ is a term that refers to the visual overhead in a computer display. A) Refresh rate B) Indirect interaction C) Chrome D) Cloud server Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 33) Some mobile applications provide ________ chrome, which pops up in the display when appropriate. A) context-sensitive B) time-oriented C) data-sensitive D) object-oriented Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 34) ________ occurs when users move their activities, especially long-running transactions, across devices. A) Cloud computing B) Roaming C) Direct interaction D) Interfacing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
35) ________ data is data that the server sends to the device. A) Nonlinear B) Linear C) Pull D) Push Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 36) ________ data is data that the device requests from the server. A) Nonlinear B) Linear C) Pull D) Push Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 37) Chrome is a term that refers to the visual overhead in a computer display. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 38) Direct interaction is the usage of content to drive application behavior. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 39) Context-sensitive chrome pops up in the display when appropriate. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
40) Charms refers to the ability to move activities, especially long-running transactions, across devices. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 41) Push data is data that the device requests from the server. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 42) When some applications move complex code onto powered and powerful cloud servers, it improves the security. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 43) Explain the role of feature content in a quality mobile application. Answer: Quality mobile user interfaces should place the primary emphasis on users' content, giving such content as much of the display as possible. Rather than show menus, toolbars, and heavy window borders, the content should be shown cleanly and in center stage. Chrome is a term that refers to the visual overhead in a computer display. It is the windows, the menus, and other apparatus that drive the application. Because mobile screen size is often limited, modern mobile applications eliminate it as much as possible. The use of content to drive application behavior is called direct interaction. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
44) State the primary characteristics of a quality mobile application. Answer: The primary characteristics of a quality mobile application are: 1. Feature content and supporting direct interaction 2. Using context-sensitive chrome when needed 3. Providing animation and lively behavior 4. Designing to scale and share (display and data) 5. Using the cloud AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 45) What is roaming? What are its applications? Answer: Roaming occurs when users move their activities, especially long-running transactions (reading a book, for example) across devices. The best mobile applications do this transparently; the user need take no action. Kindle apps inform iPad users about the most recently viewed page of a book when they open it on an iPhone. This is done entirely automatically. Roaming can achieve greater power when mobile applications allow roaming for other longrunning transactions as well; editing a document, spreadsheet, or other Office documents are examples. At some point, applications like CRM and ERP may support roaming as well. In this context, push data is data that the server sends to or pushes onto the device whereas pull data is data that the device requests from the server. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.4: What characterizes quality mobile user experiences? Classification: Concept 46) Which of the following is an advantage of employees using their mobile systems at work? A) cost savings B) no risk of infection C) lower compatibility problems D) no real danger of lost or damaged data Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.5: What are the challenges of personal mobile devices at work? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
47) Which of the following is a disadvantage of employees using their mobile systems at work? A) limited productivity B) lower employee satisfaction C) greater need for training D) greater support costs Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.5: What are the challenges of personal mobile devices at work? Classification: Concept 48) The advantages of employees using their mobile systems at work include cost savings and greater employee satisfaction. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.5: What are the challenges of personal mobile devices at work? Classification: Concept 49) The disadvantages of employees using mobile systems at work include a greater need for training. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.5: What are the challenges of personal mobile devices at work? Classification: Concept 50) State the advantages and disadvantages of employee use of mobile systems at work. Answer: The advantages of employee use of mobile systems at work include cost savings. It also leads to greater employee satisfaction of using devices that employees chose according to their own preferences rather than organization-supplied PCs. Because employees are already using these devices for their own purposes, they need less training and can be more productive. This implies reduced support costs. On the other hand, employee use of mobile devices has significant disadvantages. There is the real danger of lost or damaged data. When data is brought into employee-owned computing devices, the organization loses control over where it goes or what happens to it. Organizations also lose control over the updating of software and the applications that users employ. This control loss leads to compatibility problems as well. Possibly the greatest disadvantage of employee use of their own devices is the risk of infection. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 15.5: What are the challenges of personal mobile devices at work? Classification: Concept 14 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 4 Introduction to Microsoft Excel 2013 1) A ________ is a table of data having rows and columns. A) spreadsheet B) notepad C) clip art D) pie chart Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 2) In an Excel spreadsheet, rows are identified by ________. A) letters B) numbers C) Roman numerals D) symbols Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 3) In an Excel spreadsheet, columns are identified by ________. A) letters B) numbers C) Roman numerals D) symbols Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) In Excel, a single spreadsheet is known as a ________. A) workbook B) note C) worksheet D) page Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 5) In Excel, the intersection of a row and a column is called a ________. A) node B) grid C) cell D) junction Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 6) An Excel workbook is a collection of one or more worksheets. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 7) Excel creates multiple worksheets when a new workbook is created. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 8) Each cell in an Excel spreadsheet is identified by the data entered in it. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
9) What is a spreadsheet? Answer: A spreadsheet is a table of data having rows and columns. The rows are identified by numbers, and the columns are identified by letters. The term spreadsheet almost always refers to an electronic spreadsheet, and most frequently to a spreadsheet that is processed by Microsoft Excel. Electronic spreadsheets provide incredible labor savings over paper spreadsheets and were a major factor in the early adoption of personal computers. In Excel, the term worksheet refers to a spreadsheet. One or more worksheets are combined to form a workbook. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 10) Explain the process of naming the rows, columns, and cells in Microsoft Excel. Answer: Excel spreadsheets have rows and columns. The rows are identified by numbers, and the columns are identified by letters. Because there are only 26 letters in the alphabet, the following scheme is used to label columns: The letters A through Z identify the first 26 columns; the letters AA through AZ identify the next 26; BA through BZ the next 26; and so forth. The intersection of a row and a column is called a cell. Each cell is identified by the name of its row and column. For example, cell K5 is situated in the column K and row number 5. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.1: What is a spreadsheet? Classification: Concept 11) In Excel, the wide bar of tools and selections that appears just under the tabs is called the ________. A) menu tab B) task pane C) gridline D) ribbon Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) To add graphs, hyperlinks, or images to an Excel worksheet, the ________ tab is used. A) DATA B) FORMAT C) VIEW D) INSERT Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 13) In Excel, which of the following tabs is used for filtering and sorting information in a spreadsheet? A) DATA B) REVIEW C) INSERT D) HOME Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 14) In Excel, the REVIEW tab is used for ________. A) creating more complex formulas B) filtering and sorting data C) tracking changes and making comments D) configuring the appearance of Excel Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) The ________ tab is used for configuring the appearance of Excel. A) VIEW B) REVIEW C) DATA D) HOME Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 16) In Excel, the most frequently used tools and selections appear under the ________ tab. A) DATA B) HOME C) VIEW D) REVIEW Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 17) To save a worksheet in Excel, the Save option in the Edit menu is used. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 18) In Excel, a sequence of tabs that appear in a horizontal line, just below the Excel icon, controls the contents of the ribbon. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
19) In Excel, when the HOME tab is selected, the contents of the ribbon concern charts, filter, tables, and so forth. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 20) In Excel, the PAGE LAYOUT tab is used to format a page, often for printing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 21) For general work in Excel spreadsheets, the tools and selection under the DATA tab are most useful. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 22) In Excel, the FORMULAS tab is used for creating complex formulas. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.2: How do you get started with Excel? Classification: Concept 23) A user enters a formula into cell G9. Which of the following would be possible if the user presses the F2 function key after selecting the cell G9? A) The formula in G9 can be edited without retyping the entire formula. B) The formula can be copied to the clipboard. C) A graph can be created based on the cells that appear in the formula. D) The formula in the cell can be locked. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 6 Copyright © 2016 Pearson Education, Inc.
24) If a user enters the value 100 into cell G1, presses Enter, and then clicks the cell G1, a rectangle will be drawn around the cell with a little black box in the lower right-hand corner. Which of the following occurs if the user drags that little black box down to cell G7? A) Excel will display values that progressively increase by 100 in each of those cells. B) All of those cells will remain blank. C) Excel will display the value 100 in all of those cells. D) All of those cells' values will be multiplied by 100. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 25) A user enters a1 and a2 into cells G1 and G2, respectively. If the user selects those two cells and drags the small black box to the four cells below them, then the four cells will display ________. A) a3, a4, a5, and a6 B) b1, b2, c1, and c2 C) A1, A2, A1, and A2 D) a1, a2, a1, and a2 Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 26) If a user enters "jan" and "feb" in cells E1 and E2, respectively, selects those two cells and drags the small black box to three more cells below them, then ________. A) the three cells will remain empty B) Excel will display an error message C) the three cells will display "jan," "feb," and "jan," respectively D) the three cells will display "mar," "apr," and "may," respectively Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
27) Data can be imported to Excel from other programs. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 28) Excel lacks features that can add data into a spreadsheet based on a pattern. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 29) If the months of a year are entered in the text form, then Excel does not recognize them as a pattern. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 30) Using the F2 function key is recommended when a user has a long value in a cell and wants to edit a letter or two without retyping the whole entry. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
31) What are the different ways of entering data into an Excel worksheet? Answer: Data can be entered into an Excel worksheet in three ways: 1. Key in the required data – to key in the required data, click on the cell in which the data is to be added, type the data, and press Enter. 2. Let Excel add data based on a pattern – to add data based on a pattern, enter values based on the pattern in one or more cells, select the cell(s), and drag the mouse to the required number of cells. 3. Import data from another program – data can be entered into an Excel worksheet by importing data from another program such as Microsoft Access. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.3: How can you enter data? Classification: Concept 32) Which of the following is true of the options for modifying rows and columns in Excel? A) To add a column, click the name of the column before which new columns are needed and select as many columns to the right as required. B) To increase the size of a column, drag the line between the two columns in the column headings to the left. C) To insert new rows, click the number of the row below which new rows are needed and select as many rows below as required. D) To decrease the height of a row, drag the line between the line numbers down. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.4: How can you insert and delete rows and columns and change their size? Classification: Concept 33) In Excel, to insert new rows, click the number of the row above which new rows need to be added, and then select the number of rows to be added. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.4: How can you insert and delete rows and columns and change their size? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
34) In Excel, an entire row or column can be selected by clicking the name of the row or column. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.4: How can you insert and delete rows and columns and change their size? Classification: Concept 35) Explain the process of inserting rows and columns in Microsoft Excel. Answer: To insert new rows in Microsoft Excel, click the number of the row above which new rows are to be inserted and select as many rows as required, left-click, and then select Insert. The new rows would be inserted above the selected row. To add columns in Microsoft Excel, click the name of the column before which new columns are to be inserted, select as many columns to the right as required, right-click, and then select Insert. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.4: How can you insert and delete rows and columns and change their size? Classification: Concept 36) The ________ section of the ribbon in Excel enables selected text to be centered both horizontally and vertically in a cell. A) font B) alignment C) styles D) editing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.5: How can you format data? Classification: Concept 37) Selecting the $ English (U.S.) option displays numbers with a dollar sign and two decimal places. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.5: How can you format data? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) In Excel, every formula must begin with a(n) ________ sign. A) plus B) minus C) percentage D) equal Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept 39) In Excel, ________. A) only 26 columns are present B) an entire row cannot be deleted, but an entire column can be deleted C) only numbers are recognized as patterns used to fill data D) a formula that does not start with an equal sign is considered as a text value Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept 40) In an Excel sheet, what is the meaning of the formula =SUM(C3:C8)? A) Add all the values starting from the third cell to eighth cell in the third column. B) Add all the values starting from the third cell to eighth cell in the third row. C) Add the value of the third cell in the third column to the eighth cell in the third column. D) Add the value of the third cell in the third row to the eighth cell in the third row. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept 41) Whenever users have a problem with a calculation in Excel, they can press F2 to highlight the cells involved in that calculation. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) While copying a formula, Excel can adjust the terms of the formula to refer to the cells, in the row to which it is copied. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept 43) The real power of Excel lies in its amazing computational capability. Explain. Answer: Excel can be used to work with a number of built-in and user-created formulas. It has a system in place to highlight areas that need to be corrected and to assign color codes to the cells so that a user can easily see which cells are being used in a given formula. Excel also has the capability to copy formulas and adjust the terms of the formula so that each would refer to cells in the row to which it was copied. Finally, it has a number of preprogrammed activities that allow users to sum figures, average figures, and perform many other calculations by selecting a choice from the Formulas tab. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.6: How can you create a (simple) formula? Classification: Concept 44) In Excel, ________ refers to whether a worksheet is printed normally or sideways on a page. A) layout B) orientation C) alignment D) setup Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.7: How can you print results? Classification: Concept 45) Which of the following is true of the printing option in Excel spreadsheets? A) Gridlines can only be viewed in the print preview and cannot be printed. B) Print Preview is present in the Review tab. C) Landscape orientation prints a worksheet upright. D) Print area can be used to specify the portion of the spreadsheet to be printed. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.7: How can you print results? Classification: Concept 12 Copyright © 2016 Pearson Education, Inc.
46) The tools and selections in the PAGE LAYOUT ribbon determine how a document will be arranged as a printed document. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.7: How can you print results? Classification: Concept 47) If a spreadsheet is printed sideways on a page, the orientation is said to be portrait. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.7: How can you print results? Classification: Concept 48) The portion of the spreadsheet to be printed can be specified using margins. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 16.7: How can you print results? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 5 Database Design 1) Which of the following is true of a data model? A) It is created after the database is designed. B) It is an attribute whose value is associated with only one entity instance. C) It is a logical representation of the structure of the data. D) It does not describe the relationships among the data. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept 2) Once the users have validated and approved the data model, it is transformed into a ________. A) database design B) technical report C) knowledge system D) data repository Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept 3) A data model is a logical representation of the structure of the data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept 4) A data model does not depict the relationships among the data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
5) A data model should be transformed into a database design only after the users have approved and validated it. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept 6) Explain the database development process. Answer: A database application consists of forms, reports, queries, and application programs. At first, the developers interview users and develop the requirements for the new system. During this process, the developers analyze existing forms, reports, queries, and other user activities. The requirements for the database are then summarized in a data model, which is a logical representation of the structure of the data. The data model contains a description of both the data and the relationships among the data. It is similar to a blueprint. Once the users have validated and approved the data model, it is then transformed into a database design. After that, the design is implemented in a database, and that database is then filled with user data. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.2: How are database application systems developed? Classification: Concept 7) Which of the following is a highly popular technique for creating a data model with which the developers describe the content of a database by defining what is to be stored in the database and the associations among them? A) entity-relationship (E-R) data model B) Unified Modeling Language (UML) C) object-relational model D) semantic data model Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Which of the following is true of entities? A) Entities have an identifier whose value is associated with every entity in the data model. B) Entities can only represent a logical construct or transaction, not a physical object. C) The characteristics of entities are described by attributes. D) The names of entities are always plural. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 9) ________ describe the characteristics of entities. A) Attributes B) Dependencies C) Cardinalities D) Alternatives Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 10) ________ are attributes whose values are associated with one, and only one, entity instance. A) Cardinalities B) Descriptors C) Dependencies D) Identifiers Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 11) Which of the following is true of an entity-relationship (E-R) diagram? A) Each entity is shown in separate rectangles. B) Many-to-many relationships are generally denoted by N:N. C) A crow's foot represents a 1:N relationship between two entities. D) Crow's foot is a shorthand representation for a single relationship between entities. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
12) In a university, each adviser can advise multiple students, but each student can have only one adviser. In a data model, this can be best represented by ________. A) N:M relationships B) N:N relationships C) 1:N relationships D) 1:1 relationship Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 13) Which of the following notations signifies that an adviser can be related to many students and that a student can be related to many advisers? A) 1:N B) N:M C) N:1 D) N:N Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 14) In an organization, the administrative department consists of one clerk whose sole responsibility is the management of various administrative functions. The notation that accurately indicates this relationship is ________. A) 1:N B) N:N C) 1:1 D) N:M Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) The little lines in an entity-relationship (E-R) diagram used as shorthand to represent multiple relationships are referred to as a(n) ________. A) crow's foot B) identifier C) attribute D) cardinality line Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 16) Maximum cardinality in an entity-relationship (E-R) diagram refers to the maximum number of ________. A) normalizations possible in a diagram B) entities that can be involved in a relationship C) identifiers possible in a particular diagram D) attributes associated with an entity Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 17) Entities have attributes that describe characteristics of the entity. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 18) An identifier is an attribute whose value is associated with every entity in the data model. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
19) Entities have relationships to attributes but not to each other. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 20) In an entity-relationship (E-R) diagram, a line is used to represent a relationship between two entities. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 21) The notation N:N is used to indicate a many-to-many relationship in an E-R diagram. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 22) While representing the relationship between two entities in an entity-relationship diagram, the N:N notation is used to indicate that the same number of entities are present on each end of the relationship. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 23) 1:N means that more than one entity is allowed on each side of the relationship. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
24) The crow's foot notation shows the minimum number of entities that can be involved in a relationship. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 25) The maximum number of entities that can be involved in a relationship is known as maximum cardinality. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 26) In an entity-relationship diagram, a vertical bar on a line indicates that at least one entity of that type is required in the relationship. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 27) What are the different types of relationships represented in a data model? Answer: Entities in a data model have relationships with each other. Database designers use diagrams called entity-relationship (E-R) diagrams to explain the relationships. The relationships can be of three types: one-to-one, one-to-many, and many-to-many. The one-to-one relationship is denoted by 1:1 and one-to-many is denoted by 1:N. Many-to-many relationships are denoted by N:M. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) Explain the difference between maximum and minimum cardinality. Answer: Cardinality is the number of entities that can be involved in a relationship. There can be both a maximum and minimum constraint on cardinality. The maximum number of entities that can be involved in a relationship is known as maximum cardinality. Constraints on minimum requirements (minimum entities) are called minimum cardinalities. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.3: What are the components of the entity-relationship data model? Classification: Concept 29) The process of converting poorly structured tables into two or more well-structured tables is referred to as ________. A) replication B) integration C) actualization D) normalization Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 30) The data integrity problem can occur only if data are ________. A) duplicated B) missing C) inefficient D) insufficient Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 31) Normalized tables eliminate ________. A) data dependency B) data duplication C) data insufficiency D) data conversion Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 8 Copyright © 2016 Pearson Education, Inc.
32) The general goal of normalization is to ________. A) create a copy of an existing table B) establish relationships among the entities in a table C) convert two or more tables into a single table D) construct tables such that every table has a single topic Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 33) According to the kinds of problems they have, database practitioners classify tables into various ________. A) solved forms B) cardinalities C) normal forms D) relationships Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 34) Normalization is a database design concept that helps to construct well-structured tables. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 35) The data integrity problem can occur only if data are missing. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
36) The general goal of normalization is to construct tables such that every table has a single topic or theme. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 37) Tables that are not normalized can have data integrity problems. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 38) Database practitioners classify tables into various normal forms according to the kinds of problems they have. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 39) To represent an N:M relationship between two entities, two normalized tables are sufficient. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
40) How is a data model transformed into a database design? Answer: Database design is the process of converting a data model into tables, relationships, and data constraints. The database design team transforms entities into tables and expresses relationships by defining foreign keys. The tables in a model must be normalized before they are converted into designs. Normalization is the process of converting poorly structured tables into two or more well-structured tables. Database practitioners classify tables into various normal forms according to the kinds of problems they have. Transforming a table into a normal form to remove duplicated data and other problems is called normalizing the table. After normalizing, the designer should represent the relationship among those tables to complete the design. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 41) What are the steps involved in transforming a data model into a relational database design? Answer: The first step in transforming a data model into a relational database design involves the creation of a table for each entity by the database designer. The identifier of the entity becomes the key of the table. Each attribute of the entity becomes a column of the table. Next, the resulting tables are normalized so that each table has a single theme. Once that has been done, the next step is to represent the relationship among those tables. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.4: How is a data model transformed into a database design? Classification: Concept 42) The easiest time to change the database structure is ________. A) during the data modeling stage B) after constructing the database C) during the database designing stage D) after creating database reports Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.5: What is a users' role? Classification: Concept 43) The easiest time to change the database structure is after the database has been constructed and loaded with data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.5: What is a users' role? Classification: Concept 11 Copyright © 2016 Pearson Education, Inc.
44) Explain the role of users in designing a database. Answer: A database is a model of how the users view their business world. This means that the users are the final judges as to what data the database should contain and how the records in that database should be related to one another. The easiest time to change the database structure is during the data modeling stage. So the user should be actively involved in the modeling process. The user review of a data model is crucial. The data model must accurately reflect the user's view of the business. Users should devote the time necessary to thoroughly review a data model, as any mistakes will be difficult and costly to correct. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 17.5: What is a users' role? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 6 Using Microsoft Access 2013 1) Before using a database management system (DBMS), a user should create a(n) ________. A) data model B) database C) identifier D) attribute Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 2) Which of the following is the first activity to be performed while creating a database using Microsoft Access? A) naming the database B) assigning field names C) creating field description D) creating a table Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 3) Which of the following statements is true of naming a new database in Microsoft Access? A) A user must type the name of the new database in the blank provided under File Name. B) A user must select the name of his new database from the drop down list provided next to the File Name. C) Microsoft Access opens the new database with the default name, database 1. D) Microsoft Access requires a user to name the new database before selecting a Blank desktop database. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Microsoft Access opens a new database by creating a ________. A) new Word document in the cloud B) default Microsoft spreadsheet named A1 C) default table named Table D) shared storage space in the server Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 5) In Microsoft Access, different attributes are referred to as ________. A) identifiers B) keys C) entities D) fields Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 6) In Microsoft Access, the description of fields is used to ________. A) document the details of each field B) define rules for how each field should behave C) define how the fields should behave in case of exceptions D) specify the data types of the fields Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 7) Which of the following is a valid entry for field size if the data type of the field is Number? A) Alphanumeric B) Special characters C) Long integer D) Character Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
8) Which of the following statements is true about a primary key in Microsoft Access? A) Only one field in a table can be marked as the primary key. B) The attribute which is italicized is the primary key. C) A primary key should have its Required Field property set to No. D) A foreign key can be used as one of the fields for a primary key. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 9) Before using any database management system (DBMS), a user should create a data model based on users' requirements. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 10) In Microsoft Access, an underlined attribute is a primary key and an italicized attribute is a foreign key. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 11) Microsoft Access opens a new database by creating a default table named Table A. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 12) In Microsoft Access, one must select the relationships option in the Design tab to modify the design of a default table. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 3 Copyright © 2016 Pearson Education, Inc.
13) Every field in Microsoft Access must have a Description associated with it. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 14) The Description field in Microsoft Access is used mainly for documentation. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 15) Any text entered as the Description of a field is displayed as help text on forms. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 16) In Microsoft Access, "Integer" is a valid entry for Field Size if the Data Type is "Text." Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 17) What steps must a database designer take before creating a database with Microsoft Access? Answer: A designer needs to first create a data model from a list of the users' requirements. Then, the data model must be transformed into a database design. Only at this point should tables be created in a database management system (DBMS). AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
18) Explain the procedure for creating a new database using Microsoft Access. Answer: To create a new database, select Blank desktop database from the templates displayed in the center of the opening screen. Then, type the name of the new database under File Name. Microsoft Access will suggest a directory; change it if another one should be used, and then click Create. Microsoft Access opens the new database by creating a default table named Table. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.1: How do you create tables? Classification: Concept 19) Relationships can be defined in Microsoft Access by selecting the ________ tab in the ribbon. A) Database Tools B) External Data C) Connections D) Add-Ons Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 20) In Microsoft Access, to create a relationship between one row of a table and an unlimited number of rows in another table, users should ________. A) drag the primary key in one table to the foreign key in another table B) create a link between the foreign keys of both the tables C) drag the foreign key in one table to the primary key in another table D) create a link between the primary key in one table to the primary key in another table Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
21) In Microsoft Access, the step after creating a relationship between two tables is to ________. A) create macros B) enter data C) provide table description D) create queries Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 22) In Microsoft Access, after creating a relationship between two tables, the user cannot and need not assign values for the ________. A) queries B) primary key C) foreign key D) add-ons Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 23) In Microsoft Access, a user has to define the relationship between two tables before creating them. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 24) In Microsoft Access, relationships can be defined by selecting the Database Tools tab. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
25) To create a relationship between one row of a table and an unlimited number of rows in another table using Microsoft Access, users must drag the foreign key in one table to the primary key in another table. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 26) To delete data in Microsoft Access, a user should double-click the table name in the left hand pane. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept 27) Explain the procedure for establishing a relationship between two tables in Microsoft Access. Answer: After creating tables in Microsoft Access, the next step is to define relationships. This can be done by clicking the Database Tools tab in the ribbon and then clicking the Relationships icon near the left-hand side of that ribbon. The Relationships window will open and the Show Table dialog box will be displayed. Double-clicking on table names will add those tables to the Relationships window. Close the Show Table dialog box. To create a relationship between one row of the first table and an unlimited number of rows in the second table, click on the primary key attribute in the first table and drag that attribute on top of the foreign key in the second table. In the dialog box, click Enforce Referential Integrity, then Cascade Update Related Fields, and then Cascade Delete Related Records. Close the Relationships window and save the changes when requested to do so. The database now has two tables and a relationship. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.2: How do you create relationships? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) Which of the following is one of the alternatives for creating a data entry form in Microsoft Access? A) data definition tab B) query wizard C) property sheet D) default table display Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept 29) Which of the following options in Microsoft Access can be used to present data in a more pleasing manner than the default table display? A) form B) tab order C) property sheet D) spread sheet Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept 30) To delete a record in Microsoft Access, a user has to select the Records section in the ________ tab. A) Database tools B) Home C) Fields D) File Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
31) Microsoft Access provides a default table display for creating a data entry form. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept 32) In Microsoft Access, the option to generate a data entry form is present in the Create ribbon. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept 33) In Microsoft Access, a surrogate key has no meaning to the user. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept 34) Explain the different alternatives provided by Microsoft Access for creating data entry forms. Answer: Microsoft Access provides several alternatives for creating a data entry form. The first is to use the default table display. The default table display provided by Microsoft Access can be used to enter the required data. This display, although convenient, is limited in its capability. It also does not provide a very pleasing user interface. For more generality and better design, users can use the Microsoft Access form generator. The form generator can generate a data entry form that is more pleasing to view and easier to use than the default table. To use this form, first click the Create tab to open the Create ribbon. Next, click the table for which they want to enter data. Finally, click Form. Microsoft Access uses metadata about the tables and their relationship to create the data entry form. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.3: How do you create a data entry form? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
35) All relational database management system (DBMS) products can process the ________ query language. A) SQL B) PHP C) DB10 D) HTML Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept 36) Which of the following statements is true about queries in Microsoft Access? A) Only rows with value matches in all tables are shown by default if more than one table is selected. B) Only rows having "Number" data type can be used to arrange the results of a query in ascending order. C) Queries can include fields from only one table. D) The query design option is present in the Database Tools tab. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept 37) Microsoft Access can process SQL. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept 38) Though Microsoft Access can be used to create and process queries, it does not provide a graphical interface for the queries. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
39) To create a query in Microsoft Access, one must drag columns out of the required tables into the grid in the lower part of the query definition form. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept 40) By default, for queries of two or more tables, Microsoft Access shows only those rows that have value matches in both tables. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.4: How do you create queries using the query design tool? Classification: Concept 41) To create a report with data from two or more tables, we must use the ________. A) Report Wizard B) Navigation tab C) Report Design D) SharePoint lists Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept 42) Which of the following tabs in Microsoft Access is used to generate reports? A) Create B) Data C) Tools D) Format Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
43) Which of the following statements is true of reports in Microsoft Access? A) Reports can be created by using the sections in the Database Tools tab. B) Report Wizard is required when data from more than one table is to be used. C) Only the primary key's column width can be increased in a report. D) A report cannot be used to present the sum or average of values stored in a database. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept 44) To create a report in Microsoft Access with data from a single table, we must use the Report Wizard. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept 45) In Microsoft Access, a report is created using a process similar to that for forms. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept 46) The option to create reports can be found in the Database Tools tab of Microsoft Access. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept 47) In Microsoft Access reports, the Grouping & Totals section contains the options to display totals in a report. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
48) How can a user generate reports in Microsoft Access? Answer: Users can create a report using a process similar to that for forms, but the report won't include data from more than one table. Report Wizard is used to create a report with data from two or more tables. Click the Create tab, and then in the Reports section click Report Wizard. Now, select the tables in the Table/Queries combo box, highlight the field in the Available Fields list, and click the single chevron (>) to add the selected field to the report. Using a similar process, other fields can be added, even from other tables. On clicking Finish, the report is generated. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 18.5: How do you create a report? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 7 Using Excel and Access Together 1) A user can readily create data entry forms, queries, and sophisticated and professional reports with the help of ________. A) Microsoft Publisher B) Microsoft Access C) Microsoft Word D) Microsoft Excel Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 2) ________ is well-suited for tracking orders, inventory, equipment, people, and so forth. A) Microsoft Access B) Microsoft Word C) Microsoft PowerPoint D) Microsoft Publisher Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 3) Which of the following is an advantage of Microsoft Excel over Microsoft Access? A) Microsoft Excel is superior for tracking orders, inventory, and equipment. B) Microsoft Excel is superior for tracking people, such as employees and customers. C) Microsoft Excel is superb at processing interrelated formulas and creating stylish graphics. D) Microsoft Excel is better at creating data entry forms, queries, and professional reports. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 4) Microsoft Access is a database management system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 1 Copyright © 2016 Pearson Education, Inc.
5) Microsoft Excel is superior to Microsoft Access for tracking orders, inventory, equipment, and people. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 6) To use Microsoft Excel to process data stored in Microsoft Access, it is recommended to rekey all of the Access data into Excel. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Concept 7) Explain the significance of using Microsoft Access and Microsoft Excel together. Answer: Microsoft Excel is good at processing interrelated formulas. Due to this feature, business users often select Excel for processing financial statements, creating budgets, and performing financial analyses. Excel can be used to create sophisticated and stylish graphics with very little work from the user. Microsoft Access is a database management system (DBMS), and the primary purpose of a DBMS is to keep track of things. Access is superior for tracking orders, inventory, equipment, people, and so forth. Users can readily create data entry forms, queries, and sophisticated and professional reports with Access. So, it is often necessary to use Excel to process data stored in Access and vice versa. For example, Excel can be used to create graphs of Access data and Access can be used to summarize Excel data and produce sophisticated reports. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.1: Why use Excel and Access together? Classification: Application 8) The process of transferring data from one computer system to another is referred to as ________. A) auto transfer B) import/export C) buffer overrun D) reallocation Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
9) Which of the following statements is true of delimited files? A) Microsoft Access can import only tab-delimited files. B) Delimited files cannot be imported by Microsoft Excel. C) A comma-delimited file has data that contains commas. D) Field values in a tab-delimited file are separated by tabs. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 10) Which of the following is true about the import/export of data from Microsoft Access to Microsoft Excel? A) Data can only be transferred by exporting the data into a text file and then importing that text data. B) Delimited text files cannot be imported into both Microsoft Excel and Microsoft Access. C) The import/export process in both Microsoft Access to Microsoft Excel maintains an active connection to the source of the data. D) Data must be re-imported to Microsoft Excel in order to remain up-to-date if the source data in Microsoft Access is modified. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 11) Delimited text files can be imported to Microsoft Access by selecting the ________ tab. A) Home B) Create C) Database Tools D) External Data Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) Which of the following shows the correct sequence of steps for importing Microsoft Access data that has been stored in a text file into Microsoft Excel? A) Insert tab → Get External Data → From Access B) Edit tab → Get External Data → From Access C) File tab → Get External Data → From Text D) Data tab → Get External Data → From Text Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 13) Import/export is the process of transferring data from one computer system to another. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 14) In Microsoft Excel and Microsoft Access, import/export maintains an active connection to the source of the data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 15) If users change the Microsoft Access data, the imported data in Microsoft Excel will be outof-date until it is re-imported. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 16) While saving data in text files, commas cannot be used to separate field data if the data itself contains commas. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 4 Copyright © 2016 Pearson Education, Inc.
17) Delimited text files cannot be imported into either Microsoft Excel or Microsoft Access. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 18) To import data into Microsoft Excel, open Excel, click the Data tab, and in the Get External Data section of that ribbon click From Text. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 19) Data can be exchanged between Microsoft Excel and Microsoft Access by exporting the data into a text file and then importing that text data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 20) To exchange data between Microsoft Excel and Microsoft Access, the data must be imported into a text file and then exported. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
21) What is import/export of data? Why is it necessary to refresh the import/export data in Microsoft Excel and Microsoft Access on a timely basis? Answer: Import/export is the process of transferring data from one computer system to another. In almost all cases, including Microsoft Excel and Microsoft Access, import/export does not maintain an active connection to the source of the data. If users subsequently change the Access data, the imported data in Excel will be out of date until the users reimport it. As the imported data can become outdated, users should develop procedures (either manual or automated) to ensure that data are refreshed on a timely basis. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 22) What are delimited text files? Answer: Delimited text files are files that have field values separated by common symbols known as delimiters. The files that use commas as delimiters are known as comma-delimited files. Sometimes, however, the data itself contains commas, and so commas cannot be used to separate field data. In that case, some other character is used to delimit the fields. The tab character is frequently used, in such cases; the export file is called a tab-delimited file. Delimited text files are easy to import into either Microsoft Excel or Microsoft Access. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.2: What is Import/Export? Classification: Concept 23) Which of the following shows the correct sequence of steps for creating a pie chart in Microsoft Excel? A) Add → Charts → Pie B) Insert → Illustrations → Pie C) Diagrams → Illustrations → Pie D) Insert → Charts → Pie Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
24) Which of the following Microsoft Excel diagrams is the best to compare performance data over many years of different employees? A) pie charts B) column charts C) doughnut charts D) Venn diagrams Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 25) Which of the following tabs in Microsoft Excel contains the option to create a column chart? A) Data B) Home C) Insert D) Tools Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 26) Which of the following shows the correct sequence of steps for creating a column chart in Microsoft Excel? A) Diagrams → Illustrations → Column B) Add-Ins → Charts → Column C) Insert → Illustrations → Column D) Insert → Charts → Column Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 27) Microsoft Excel includes comprehensive tools for graphing data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) A pie chart can be created by selecting the Charts option from the Data tab in Microsoft Excel. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 29) A pie chart can be used to compare results of various data for two years or more. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 30) If a user clicks on a graph in Microsoft Excel, it will show a special tab called Chart Tools that can be used to customize the graph. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 31) To create a column chart, the data is highlighted and the Column option in the Charts section of the Insert tab is selected. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
32) Explain the procedure for creating graphs in Microsoft Excel. Answer: Microsoft Excel includes comprehensive tools for graphing data. It can be used to construct column and bar charts, pie charts, line and scatter plots, and others graphs. Graphs can be created by clicking the Insert tab in the ribbon, selecting the Charts section of that ribbon, and selecting the required graph from the dropdowns. For example, to create a pie chart, we must highlight the cells that have the required data, click the Insert tab in the ribbon, and in the Charts section of that ribbon select the Pie icon. Excel can create several different versions of pie charts. Excel provides many different tools to customize a graph. To access them, click the graph you want to change. Excel will show a special tab called Chart Tools at the top of the window. Click Chart Tools to make them available. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.3: How can you create charts with Excel? Classification: Concept 33) In Microsoft Access, the Totals button is present in the ________ section of the Design tab. A) Import/Export B) Show/Hide C) Query Type D) Query Setup Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Concept 34) An organization stores the details of its employees using Microsoft Access. The Employee table has EmployeeName, EmployeeID, Department, and Salary columns. Which of the following statements is true? A) To view the average salary drawn by the employees of each department, the Group By option should be selected in the Total row under Salary. B) To count the number of employees in each department, the Group By option should be selected under EmployeeID, and the Count option under Department. C) To find the sum of salaries drawn by the employees of each department, the Group By option should be selected under Department and Sum under Salary. D) To count the number of employees having the same salary, the Group By option should be selected under EmployeeID, and Count under Salary. Answer: C AACSB: Information Technology Difficulty: Difficult Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Synthesis 9 Copyright © 2016 Pearson Education, Inc.
35) A school stores attendance records of its students in a Microsoft Access database. The Attendance table has StudentName, StudentID, Grade, and DateAbsent columns. Each time a student is absent, an entry is made into the database. Which of the following statements is true? A) To find the average number of days students of each grade are absent, Group By should be selected under Grade and Avg under StudentID. B) To find the number of days each student is absent, Group By should be selected for StudentID, and Count for DateAbsent. C) To see which students were absent on a particular day, Group By should be selected for StudentName. D) To see the number of students absent in a particular grade on a given day, Group By should be selected for both DateAbsent and StudentID. Answer: B AACSB: Information Technology Difficulty: Difficult Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Synthesis 36) Which of the following statements is true of queries? A) In Microsoft Access, a query can be based on the results of other queries that have been saved. B) To inform Microsoft Access that the fields of two tables are the same, select the Group By option for both fields. C) The Group By option becomes available when Append is clicked under the Design tab. D) When the results of a query are imported by Microsoft Excel, they cannot be operated on. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Application 37) The Totals button is present in the Results section of the Design tab. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Concept 38) The Average function and Group By cannot be used in the same query. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Concept 10 Copyright © 2016 Pearson Education, Inc.
39) How are group totals created in Microsoft Access? Answer: Open the relevant database, click the Create tab, click Query Design, and then select a table for the query. After adding a table, click Close. Now add the fields to the query contents table by double-clicking on them in the table diagram. Click the Totals button in the Show/Hide section of the Design tab. In response, Microsoft Access adds a row labeled Total to the query contents table. To group the rows by a particular field, select the keyword Group By in the Total row under that field in the query contents table. To find the total of a field, select the keyword Sum under the appropriate column. Run the query by clicking the large exclamation point in the Results section of the Design ribbon. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Concept 40) How can Microsoft Excel be used to graph Microsoft Access data? Answer: Microsoft Access data, including queries, can be imported to Microsoft Excel to display the results with the help of Excel's graphing capabilities. To import data into Excel, open Excel, click the Data tab in the ribbon and then, in the Get External Data section, select From Access option. Excel will query Access to determine the tables and queries that exist in the chosen database. Next, Excel will ask the user on how the data should be displayed. Choose Table and Existing worksheet, and enter an absolute address for the top, left-hand corner of the table. Use the displayed data to create graphs in Excel. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.4: How can you create group totals in Access? Classification: Concept 41) Which of the following shows the correct sequence of steps for formatting currency values in Microsoft Excel? A) Home → Number → Currency B) Data → Number → Currency C) Home → Editing → Currency D) Data → Editing → Currency Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.5: How can you use Excel to graph Access data? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) Microsoft Access queries can be imported into Microsoft Excel. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.5: How can you use Excel to graph Access data? Classification: Concept 43) Importing data from Microsoft Access to Microsoft Excel is easily achieved by clicking the Data tab and directing Excel to get the external data from Access. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.5: How can you use Excel to graph Access data? Classification: Concept 44) A ________, which is a subset of the cells in a worksheet that has a unique name, enables data to be transferred from Microsoft Excel to Microsoft Access. A) specified label B) consolidation table C) named range D) calculated column Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.6: How can you use Access to report Excel data? Classification: Concept 45) Which of the following procedures must be used to create a named range for data in Microsoft Excel? A) highlight the required data → click the Formulas tab → click Define Name in the Defined Names section → enter a suitable name B) highlight the required data → click the Home tab → click Insert Name in the Cells section → enter a suitable name C) highlight the required data → click the Data tab → click Connections in the Connections section → enter a suitable name D) highlight the required data → click the Design tab → click Property Sheet in the Show/Hide section → enter a suitable name Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.6: How can you use Access to report Excel data? Classification: Concept 12 Copyright © 2016 Pearson Education, Inc.
46) A user can produce two different reports from a single set of Microsoft Excel data, by importing this data into Microsoft Access and using the Access report generator. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.6: How can you use Access to report Excel data? Classification: Concept 47) A data table is a subset of the cells in a worksheet that has a unique name and is used to transfer data from Microsoft Excel to Microsoft Access. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.6: How can you use Access to report Excel data? Classification: Concept 48) In Microsoft Excel, a single space is used to separate the words in range names. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.6: How can you use Access to report Excel data? Classification: Concept 49) Microsoft Excel cannot be used to perform calculations on data imported from Microsoft Access. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.7: How can you combine Excel and Access to analyze data? Classification: Concept 50) Sum and average functions cannot be used in Microsoft Excel on imported data that have been created using group totals in Microsoft Access. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 19.7: How can you combine Excel and Access to analyze data? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 8 Network and Cloud Technology 1) The distinguishing characteristic of a local area network (LAN) is that it ________. A) connects computers at multiple locations B) connects computers at a single location C) is a network of networks D) does not require a wired connection Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 2) A(n) ________ connects computers at different geographical locations. A) local area network B) wide area network C) Ethernet D) Econet Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 3) Computers in two separate company sites must be connected using a(n) ________. A) local area network B) wide area network C) commerce server D) Ethernet Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) A ________ is used to provide a seamless flow of data across networks. A) layered protocol B) database C) Web page D) Web server Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 5) A(n) ________ is a set of rules that programs on two communicating devices follow. A) domain B) attribute C) protocol D) database Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 6) With a wide area network (WAN), an organization can place communications lines wherever it wants because all lines reside on its premises. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 7) An internet is a network of networks that connects local area networks (LANs), wide area networks (WANs), and other internets. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) A local area network (LAN) can be used to connect computers located in Seattle and Philadelphia. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 9) A private internet that is used exclusively within an organization is called an intranet. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 10) What is the difference between a local area network (LAN) and a wide area network (WAN)? Give an example of how each one could be used in businesses. Answer: A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Wide area networks (WANs) connect computers at different geographic locations. The computers in two separated company sites must be connected using a WAN. With a LAN, the number of connected computers can range from two to several hundred, but they are still in a single location (usually within a building or floor of a building). Most small businesses have a LAN in their office that connects them. A university campus connects all the different buildings on the campus and possibly multiple campuses via a WAN. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.1: What is a computer network? Classification: Concept 11) A ________ is a networking device that detects the speed that a given device on a local area network (LAN) can handle and communicates with it at that speed. A) bus B) switch C) domain D) hub Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) The IEEE 802.3 protocol standard is also known as the ________. A) TCP/IP protocol B) Ethernet C) intranet D) Internet Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 13) Which protocol standard used for wired local area network (LAN) connections specifies hardware characteristics, such as the signal to be carried by each wire? A) Bluetooth B) WiMAX C) Ethernet D) RuBee Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 14) What does the term 10/100/1000 Ethernet in most computer systems indicate? A) the number of devices that can be connected B) the distance over which the network signal can be transmitted C) the rate at which data can be transmitted D) the Internet protocol used by a system Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) Which of the following statements is true of local area network (LAN) protocols? A) IEEE LAN protocols always start with the numbers 802. B) The IEEE 802.11 protocol is also called the Ethernet. C) Wired LANs use the IEEE 802.11 protocol. D) The IEEE 802.3ac is the current standard for wireless LANs. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 16) Which of the following wireless protocols is designed for transmitting data over short distances? A) optical fiber B) coaxial cable C) twisted-pair cable D) Bluetooth Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 17) Which of the following protocols is commonly used by wired local area networks (LANs)? A) IEEE 802.3 B) DSL C) EVDO D) WiMAX Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) Which of the following protocols is commonly used for wireless local area networks (LANs)? A) IEEE 802.11 B) Distributed Data Interface C) DSL D) IEEE 802.3 Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 19) Which of the following statements is true of an Internet service provider (ISP)? A) It separates the phone signals from computer signals on a digital subscriber line (DSL) at a user's location. B) It facilitates a one-way information transfer process between a user's computer and the Internet. C) It allows a user to communicate directly through the Internet without requiring a wireless medium of communication. D) It provides a legitimate Internet address and serves as a user's gateway to the Internet. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 20) Which of the following statements is true of digital subscriber lines (DSLs)? A) They use television lines for data transmission. B) Their signals do not interfere with voice telephone services. C) Their operations are independent of voice telephone lines. D) They do not allow data transmission to occur when telephone conversations occur. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
21) Which of the following statements is true of cable lines? A) Cable lines provide high-speed data transmission using telephone cables. B) Performance of cable lines is stable irrespective of the number of users sending and receiving data. C) Cable lines use the same protocols used by data transmission lines. D) The signals from cable lines do not interfere with TV signals. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 22) A small office or a home office local area network (SOHO LAN) requires more than a dozen computers and printers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 23) The committee that addresses local area network (LAN) standards is called the IEEE 803 Committee. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 24) Users can download data at a maximum speed of 10 Mbps using cable lines. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 25) Most personal computers today that support 10/100/1000 Ethernet conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1,000 Mbps. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 7 Copyright © 2016 Pearson Education, Inc.
26) The IEEE 802.3 protocol is used for wired local area network (LAN) connections. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 27) Wireless mice use Bluetooth to connect to a computer. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 28) Bluetooth is a protocol that can transmit data over long distances. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 29) A digital subscriber line (DSL) operates on the same lines as voice telephones. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 30) Cable lines provide high-speed data transmission using phone lines. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
31) What is Bluetooth? What are its uses? Answer: Bluetooth is a common wireless protocol. It is designed for transmitting data over short distances, replacing cables. Some devices, such as wireless mice and keyboards, use Bluetooth to connect to a computer. Smartphones use Bluetooth to connect to automobile entertainment systems. AACSB: Information Technology Difficulty: Easy Course LO: Describe the major types of computer hardware and software used by companies. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 32) What are the three important functions of an Internet service provider (ISP)? Answer: An ISP has three important functions. First, it provides the client with a legitimate Internet address. Second, it serves as a gateway to the Internet. The ISP receives the communications from a client's computer and passes them on to the Internet, and it receives communications from the Internet and passes them on to the client. Finally, ISPs pay for the Internet. They collect money from their customers and pay access fees and other charges on their behalf. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.2: What are the components of a LAN? Classification: Concept 33) Which of the following statements defines an IP address? A) It is a protocol that specifies the format of Web pages. B) It is a number that identifies a particular device. C) It is a piece of message handled by programs that implement Internet protocol. D) It is a program that breaks up network traffic into pieces before transmission. Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 34) Which of the following statements is true of an IP address? A) The use of an IP address is limited to the public Internet. B) An IP address can be associated with just one domain name. C) The IP address that a domain name points to can be changed. D) An IP address commonly has either a three-decimal or five-decimal dotted notation. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 9 Copyright © 2016 Pearson Education, Inc.
35) A ________ is a worldwide-unique identity that is affiliated with a public IP address. A) tag name B) protocol C) domain name D) uniform resource locator Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 36) Which of the following refers to an address on the Internet? A) File Transfer Protocol B) digital subscriber line C) uniform resource locator D) Internet service provider Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 37) Which of the following is a component of the user tier? A) a computer that has browsers that request and process Web pages B) a computer that runs Web servers and processes application programs C) a computer that runs a database management system (DBMS) that processes requests for data from a commerce server D) a computer that receives Web page requests and sends them to an available server to minimize customer delays in a facility called a Web farm Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Which of the following is the second tier in the three-tier architecture arrangement? A) presentation tier B) database tier C) server tier D) user tier Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 39) ________ are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A) Content delivery networks B) Web servers C) Uniform resource locators D) Web browsers Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 40) Which of the following statements is true of Web servers? A) They typically perform the functions of tracking and managing the products in a database. B) They are part of the user tier in the three-tier architecture. C) They are used only to send and receive Webmail. D) They send and receive Web pages to and from clients. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 41) The movement from one network to another is called a hop. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) The user tier consists of computers, phones, and other devices. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 43) The server tier consists of computers that run a database management system (DBMS) that processes requests to retrieve and store data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 44) What is the TCP/IP Protocol architecture? Where are the various application-layer protocols? Answer: The protocols used on the Internet are arranged according to a structure known as the TCP/IP Protocol architecture. This architecture has five layers, and one or more protocols are defined at each layer. Data communications and software vendors write computer programs that implement the rules of a particular protocol. For protocols at the bottom layer, the physical layer, they build hardware devices that implement the protocol. The top layer, or the application layer, concerns protocols used between browsers and Web servers. Hypertext Transport Protocol (http), Simple Mail Transfer Protocol (smtp), and File Transfer Protocol (ftp) are application-layer protocols. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 45) What is HTTP? How does it work? Answer: Hypertext Transport Protocol (http) is an application layer protocol. It is used between browsers and Web servers. Browsers send and receive service requests to and from the commerce server using http. This allows browsers and servers who implement http to communicate with each another. The browsers send and receive service requests to and from a server using http. AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
46) Differentiate between private and public Internet protocol (IP) addresses. Explain the benefits of the private/public IP address scheme. Answer: Public IP addresses identify a particular device on the public Internet. Because public IP addresses must be unique worldwide, their assignment is controlled by a public agency known as Internet Corporation for Assigned Names and Numbers (ICANN). Private IP addresses identify a particular device on a private network, usually on a local area network (LAN). Their assignment is controlled within the LAN, usually by the LAN device. The private/public IP address scheme has two major benefits. First, public IP addresses are conserved. All of the computers on the LAN use only one public IP address. Second, by using private IP addresses, users are protected from attackers directly attacking them because attackers cannot send attack packets to private IP addresses. Attackers can only send packets to devices with public IP addresses. AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 47) What is a domain name? What is the procedure to get a domain name? Answer: A domain name is a worldwide-unique name that is affiliated with a public IP address. When an organization or individual wants to register a domain name, it goes to a company that applies to an ICANN (Internet Corporation for Assigned Names and Numbers) approved agency to do so. The company will first determine if the desired name is unique, worldwide. If so, it will apply to register that name to the applicant. Once the registration is completed, the applicant can affiliate a public IP address with the domain name. From that point onward, traffic for the new domain name will be routed to the affiliated IP address. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 48) What are the different tiers in the three-tier architecture used by Web applications? Answer: Almost all web applications use the three-tier architecture, which is an arrangement of user computers and servers into three categories, or tiers. The user tier consists of computers, phones, and other devices that have browsers that request and process Web pages. The server tier consists of computers that run Web servers and process application programs. The database tier consists of computers that run a database management system (DBMS) that processes requests to retrieve and store data. AACSB: Information Technology Difficulty: Easy Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.3: How does the Internet work? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
49) How does a Web server differ from a commerce server? Answer: Web servers are programs that run on a server-tier computer and manage traffic by sending and receiving Web pages to and from clients. A commerce server is an application program that runs on a server-tier computer. Typical commerce server functions are to obtain product data from a database, manage the items in a shopping cart, and coordinate the checkout process. When a request comes to the server, the Web server examines it and sends it to the proper program for processing. Thus, the Web server passes e-commerce traffic to the commerce server. It passes requests for other applications to those applications. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the components of an information system (IS). Learning Obj: LO 20.3: How does the Internet work? Classification: Concept 50) Which of the following statements is true of service-oriented architecture (SOA)? A) Work is assigned to Web servers based on their geographical proximity to a user. B) SOA services are used only between the Web server and the users. C) The number of database servers and Web servers should be in a fixed ratio. D) JavaScript is written to invoke services defined by a server application. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 51) Which of the following purposes does a Hypertext Transport Protocol (http) serve? A) determining the IP address of devices on a network B) providing a reliable network for data communication C) enabling communication between a browser and server D) dividing network traffic into packets Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
52) S in https stands for ________. A) site B) status C) speed D) secure Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 53) ________ is a common TCP/IP application-layer protocol that is used for email transmissions. A) EXtensible Markup Language B) Mail Access Protocol C) File Transfer Protocol D) Simple Mail Transfer Protocol Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 54) A common use of the File Transfer Protocol (FTP) is to ________. A) move files over the Internet B) balance server loads C) format files D) manage network traffic Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
55) ________ is a language used for transmitting documents in Web services and the cloud. A) HyperText Markup Language B) Web Services Description Language C) Structured Query Language D) eXtensible Markup Language Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 56) Which of the following statements is true of protocols supporting Web services? A) SOAP is a lower-level Internet protocol. B) XML is preferred for transmitting large volumes of data between servers and browsers. C) WSDL documents are read by developer tools to configure a programming environment. D) The metadata in JSON is well-suited for validating the format and completeness of the document. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 57) Which of the following statements is true of the JavaScript Object Notation (JSON)? A) It contains a lot of metadata to validate the format of documents. B) It is used to transmit voluminous data between browsers and servers. C) JSON documents can be processed only using the Java programming language. D) It cannot be used to support Web services. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 58) The basic plumbing of the Internet is governed by protocols that are defined according to an arrangement called the TCP/IP Protocol architecture. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
59) The TCP/IP Protocol architecture uses the same protocol in all its layers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 60) The Hypertext Transport Protocol (http) is a TCP/IP application-layer protocol. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 61) The File Transfer Protocol (ftp) is generally used for email transmissions. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept 62) SOAP is a protocol for requesting Web services and for sending responses to Web service requests. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Compare and contrast different ways of connecting to the Internet. Learning Obj: LO 20.4: How does the cloud work? Classification: Concept
17 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 9 Enterprise Resource Planning (ERP) Systems 1) ________ is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent computing platform. A) Enterprise resource planning B) Customer relationship management C) Warehouse management system D) Supply chain management Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.1: What is the purpose of ERP systems? Classification: Concept 2) The primary purpose of an enterprise resource planning (ERP) system is integration. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.1: What is the purpose of ERP systems? Classification: Concept 3) What is the primary purpose of an enterprise resource planning (ERP) system? Answer: The primary purpose of an ERP system is integration. An ERP system allows the left hand of the organization to know what the right hand is doing. This integration allows real-time updates, globally, whenever and wherever a transaction takes place. Critical business decisions can then be made on a timely basis using the latest data. AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.1: What is the purpose of ERP systems? Classification: Concept 4) Which of the following is an example of a supply chain activity? A) capacity planning B) marketing C) inventory management D) customer management Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 1 Copyright © 2016 Pearson Education, Inc.
5) Which of the following is a manufacturing activity that must be included in a true enterprise resource planning (ERP) product? A) supplier management B) capacity planning C) sales prospecting D) procurement Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 6) Customer relationship management (CRM), as an application that must be included in a true enterprise resource planning (ERP) product, includes ________. A) cash management B) HR management C) sales prospecting D) capacity planning Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 7) ________ activities include payroll, time and attendance, and benefits administration that must be integrated into applications in order to form a true enterprise resource planning (ERP) product. A) Manufacturing B) Supply chain C) Human resource D) Accounting Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) The process of maintaining a general ledger, which must be integrated into applications in order to form a true enterprise resource planning (ERP) product, is a(n) ________ activity. A) supply chain B) accounting C) human resources D) manufacturing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 9) Which of the following statements is true of enterprise resource planning (ERP) application programs? A) During the ERP development process, the development team sets configuration parameters that specify how ERP application programs will operate. B) There are virtually no limits to how much configuration can be done in an ERP application program. C) Custom programming of ERP application programs are economical both initially and for long-term maintenance. D) In order to meet varying customer requirements, development teams must often change the program code of ERP application programs. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 10) Which of the following statements is true of an enterprise resource planning (ERP) database? A) An ERP solution contains the company's operational data. B) A stored procedure is a computer program code stored within an ERP database that runs to keep the database consistent when certain conditions arise. C) An ERP solution includes initial configuration data. D) A trigger is a computer program code stored in an ERP database that is used to enforce business rules. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Which of the following statements describes a trigger? A) It is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. B) It is a computer program stored in a database that is used to enforce business rules. C) It is a set of inherent procedures in an enterprise resource planning (ERP) solution that implement standard business processes. D) It is a programming paradigm that describes computation in terms of statements that change a program state. Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 12) What is a stored procedure? A) It is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. B) It is an area of memory that is used for dynamic memory allocation. C) It is a computer program stored in a database that is used to enforce business rules. D) It is a software program that houses and serves business logic for use by multiple applications. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 13) As an element of an enterprise resource planning (ERP) solution, supply chain includes scheduling, capacity planning, quality control, bill of materials, and related activities. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 14) Enterprise resource planning (ERP) vendors design application programs to be configurable so that development teams can alter them to meet customer requirements without changing program code. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 4 Copyright © 2016 Pearson Education, Inc.
15) An enterprise resource planning (ERP) solution includes a database design, initial configuration data, and the company's operational data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 16) A stored procedure is a computer program stored within a database that runs to keep the database consistent when certain conditions arise. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 17) An example of a stored procedure would be never to sell certain items at a discount. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 18) Process blueprints are the inherent processes in an enterprise resource planning (ERP) solution that implement standard business processes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 19) Enterprise resource planning (ERP) training includes topics such as obtaining top-level management support. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
20) The enterprise resource planning (ERP) training sessions in which the implementing organization's employees teach the ERP trainers about the organization's processes are called train the trainer. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 21) Explain enterprise resource planning (ERP) application programs. Answer: ERP vendors design application programs to be configurable so that development teams can alter them to meet customer requirements without changing program code. Accordingly, during the ERP development process, the development team sets configuration parameters that specify how ERP application programs will operate. There are limits to how much configuration can be done. If a new ERP customer has requirements that cannot be met via program configuration, then it either needs to adapt its business to what the software can do or write, or pay another vendor to write, an application code to meet its requirement. Thus, choosing an ERP solution that has applications that function close to the organization's requirements is critically important to success. AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.2: What are the elements of an ERP solution? Classification: Concept 22) Which of the following tasks should be considered while implementing an enterprise resource planning (ERP) application? A) creating an as-is model that summarizes current business procedures and practices B) plunging the organization into the new system C) modeling all current practices "as-is" and implementing them on ERP application D) modifying every existing practice to match blueprint models Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept 23) For implementing enterprise resource planning (ERP) systems, the first task is to create a model of current business procedures and practices, which is called the as-is model. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept 6 Copyright © 2016 Pearson Education, Inc.
24) The differences between as-is processes and the blueprint should be reconciled after the enterprise resource planning (ERP) system has been implemented. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept 25) A new enterprise resource planning (ERP) implementation process cannot be carried out if a business is running on an old system. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept 26) An enterprise resource planning (ERP) implementation depends primarily on the backing of a departmental manager. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept 27) Explain briefly the steps for implementing enterprise resource planning (ERP) systems. Answer: The first task in implementing ERP systems is to create a model of current business procedures and practices, which is called the as-is model. Managers and analysts then compare those as-is processes to the ERP process blueprints and note differences. The company then must find ways to eliminate the differences, either by changing the existing business process to match the ERP process or by altering the ERP system. Once the differences between as-is processes and the blueprint have been reconciled, the next step is to implement the system. Before implementation starts, however, users must be trained on the new processes, procedures, and use of the ERP system's features and function. Additionally, the company needs to conduct a simulation test of the new system to identify problems. Then, the organization must convert its data, procedures, and personnel to the new ERP system. All of this happens while the business continues to run on the old system. AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.3: How are ERP systems implemented and upgraded? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
28) Which of the following aspects that impact enterprise resource planning (ERP) differs among companies of different sizes? A) relevance of ERP systems B) value chains C) availability of skilled IT staff D) basic business processes Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 29) Which of the following statements is true of the impact of enterprise resource planning (ERP) on the IT staff of small organizations? A) IT specialists in small organizations are dedicated to managing only the ERP system. B) The IT staff in small organizations is isolated from senior management. C) The chief information officer obtains the backing of the entire executive group for ERP implementation. D) IT specialists in small organizations are spread very thin and often are in over their heads during an ERP implementation. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 30) Which of the following statements is true of the effect of enterprise resource planning (ERP) on the IT staff of midsized organizations? A) In midsized organizations, the IT staff is often isolated from senior management. B) ERP implementation in midsized companies will be part of a strategic process and, once begun, will have the full backing of the entire executive group. C) IT specialists in midsized organizations are spread very thin and often are in over their heads during an ERP implementation. D) Midsized organizations employ only one or two IT specialists. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
31) Which of the following statements is true of the types of organizations that use enterprise resource planning (ERP)? A) ERP vendors started selling ERP solutions to distributors after their success with the manufacturing industry. B) Implementing ERP in organizations of different scales is difficult due to the differences in their basic business processes. C) ERP procedures are uniform in large organizations operating in multiple countries. D) Availability of IT personnel does not have an impact on ERP implementation. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 32) Enterprise resource planning (ERP) was initially adopted by government and public service agencies to handle complex administrative tasks. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 33) Small organizations tend to employ only one or two IT specialists who not only manage the enterprise resource planning (ERP) system, but the entire IS department as well. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 34) In midsized organizations, the first step in moving toward enterprise resource planning (ERP) is to obtain deep senior-level management commitment to the project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
35) Explain how organizations of different sizes use enterprise resource planning (ERP) differently. Answer: Companies of different sizes have one very important difference that has a major impact on ERP: the availability of skilled IT personnel. Small organizations employ only one or two IT specialists who not only manage the ERP system, but the entire IS department as well. They are spread very thin and often are in over their heads during an ERP implementation. Smaller, simpler ERP solutions are common among these companies. Midsized organizations expand IT from one person to a small staff, but frequently this staff is isolated from senior management. Such isolation creates misunderstanding and distrust. Because of the expense, organizational disruption, and length of ERP projects, senior management must be committed to the ERP solution. When IT management is isolated, such commitment is difficult to obtain and may not be strong. This issue is so prevalent that many ERP consultants say the first step in moving toward ERP is to obtain deep senior-level management commitment to the project. Large organizations have a full IT staff that is headed by the chief information officer (CIO), who is a business and IT professional who sits on the executive board and is an active participant in organizational strategic planning. ERP implementation will be part of that strategic process and, once begun, will have the full backing of the entire executive group. AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.4: What types of organizations use ERP? Classification: Concept 36) ________ offers Business Cloud, an enterprise resource planning (ERP) solution that can be used as a software service, can be installed on the customer's servers and managed by personnel. A) Sage B) SAP C) Infor D) Oracle Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
37) In the future, which of the following Microsoft products is likely to be a true enterprise resource planning (ERP) product for larger organizations? A) Solomon B) Nav C) AX D) GP Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 38) Which of the following statements is true of Oracle's enterprise resource planning (ERP) products? A) Oracle has never been known to create easy-to-use ERP products. B) Oracle traditionally does not develop its ERP products in-house. C) Oracle's ERP products are not available on mobile devices. D) Oracle's ERP products are not designed according to SOA principles and hence are noncustomizable. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 39) Which of the following statements is true of enterprise resource planning (ERP) products offered by SAP? A) SAP HANNA is a SaaS (software as a service) cloud offering. B) SAP does not have technical, marketing, sales, and customer support challenges. C) Classic SAP uses thick-client, client/server architecture. D) Because of its installed base, SAP can make a rapid move to cloud-based solutions. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
40) Which of the following statements is true of Microsoft's enterprise resource planning (ERP) products? A) Dynamics CRM is a true ERP product used by large organizations. B) GP is the easiest of Microsoft's ERP products to install. C) Nav is likely to continue as a general-ledger program in the future. D) AX is developed in-house by Microsoft. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 41) Which of the following statements is true of an enterprise resource planning (ERP) software in the cloud? A) Customers of thick-client, client/server ERP software can move to the cloud at low costs. B) Cloud-based ERP software is more expensive for customers. C) Mobile systems using cloud-based ERP require thin-client applications. D) It is safe to provide mobile systems access to ERP systems. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 42) Infor Business Cloud is an enterprise resource planning (ERP) solution that can be installed in a bare-bones way and offered as IaaS (infrastructure as a service). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 43) Microsoft relies heavily on its network of independent software vendors to create customer solutions using the Solomon platform. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
44) Oracle's enterprise resource planning (ERP) products are designed according to SOA principles and hence are adaptable and customizable. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 45) SAP's enterprise resource planning (ERP) products are relatively economical compared to other companies' products. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 46) Infor's enterprise resource planning (ERP) products span the mid-range, serving higher-end small companies and lower-end large companies. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 47) PeopleSoft is an HR product developed in-house by Oracle. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 48) Microsoft offers its CRM product online as SaaS (software as a service), but it has no full enterprise resource planning (ERP) implementation in the cloud. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
49) Briefly describe Microsoft's enterprise resource planning (ERP) products. Answer: Microsoft offers five ERP products, all obtained via acquisition: AX, Nav, GP, Solomon, and Dynamics CRM. AX and Nav have the most capabilities; GP is more limited but is easier to use. The future of Solomon is uncertain. Dynamics CRM is primarily a CRM product, but it is extensible in ways that enable customers to use it for ERP as well as CRM. Microsoft is in the process of consolidating its offerings. Most likely AX will continue going forward as a true ERP product for larger organizations. Dynamics CRM will serve as a CRM product as well as a platform for custom ERP solutions. GP, which is the easiest of the products to install, will continue as a general-ledger program that can also be used as a platform for simpler ERP solutions. Microsoft relies heavily on its network of independent software vendors to create customer solutions using the Dynamics platform. These vendors take off-the-shelf Dynamics products and adapt and customize them for particular situations. Microsoft offers its CRM product online as SaaS, but it has no full ERP implementation in the cloud. AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept 50) Briefly explain Infor's enterprise resource planning (ERP) products. Answer: After Infor was purchased by private-equity investors, it bought many ERP companies. It now sells many ERP products for many different industries. These products vary in purpose, scope, and quality. They span the midrange, serving higher-end small companies and lower-end large companies. Recently, Infor began to offer the Infor Business Cloud, an ERP solution that can be used as a software service, can be installed on the customer's servers and managed by Infor personnel, or can be installed in a bare-bones ways and offered as IaaS. AACSB: Information Technology Difficulty: Easy Course LO: Describe the uses of enterprise systems and enterprise resource planning. Learning Obj: LO 21.5: How do the major ERP vendors compare? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 10 Supply Chain Management 1) Which of the following statements is true of an inter-enterprise system? A) It is constant in scope and complexity. B) It cannot be customized to the needs of organizations. C) It is shared by two or more independent organizations. D) It is easier to manage than other types of systems. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.1: What are typical inter-enterprise processes? Classification: Concept 2) Several organizations can share a single inter-enterprise information system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.1: What are typical inter-enterprise processes? Classification: Concept 3) The Automated Clearing House system among banks is an example of a standardized interenterprise system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.1: What are typical inter-enterprise processes? Classification: Concept 4) Explain inter-enterprise (IS) processes with an example. Answer: An inter-enterprise is an information system that is shared by two or more independent organizations. Inter-enterprise (IS) varies in scope and complexity. An example of a simple interenterprise (IS) is a sales process at a small retailer in which the retailer processes customers' credit card transactions. The retailer, customer, and credit card company (and possibly the bank that issued the card) are all part of the business process that processes the payment. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.1: What are typical inter-enterprise processes? Classification: Concept 1 Copyright © 2016 Pearson Education, Inc.
5) Which of the following refers to a network of organizations and facilities that transforms raw materials into products delivered to customers? A) supply chain B) distribution channel C) strategic business unit D) collaboration system Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept 6) In a traditional supply chain, distributors order products from ________. A) retailers B) manufacturers C) customers D) suppliers Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept 7) Which of the following statements is true of supply chains? A) Supply chains consist only of customers, retailers, distributors, manufacturers, and suppliers. B) Not every supply chain has distributors and retailers. C) Each element in the supply chain can be connected to only one entity up and down. D) The only source of revenue in a supply chain is the retailer. Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Every supply chain has four basic components: suppliers, manufacturers, distributors, and retailers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept 9) At each level of a supply chain, an organization can work with many organizations both up and down the supply chain. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept 10) Each level of a supply chain has a distinct source of revenue. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.2: What is a supply chain? Classification: Concept 11) A major factor that affects supply chain performance is the ________. A) number of work-centers B) working capital C) competitors D) facilities Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) Which of the following is an example of inventory? A) machinery B) factory C) raw material D) capital Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 13) Which of the following statements is true of inventory? A) Managing an inventory requires balancing between availability and cost. B) Inventory size increases as consumers purchase items. C) Inventory management decisions are limited to the size of the inventory. D) Increasing the inventory size always increases a company's profitability. Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 14) Which of the following factors influences supply chain performance by affecting the ways that organizations in the supply chain request, respond, and update one another? A) information B) transportation C) inventory D) facilities Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) The ________ is a factor of information that can be transactional, such as orders and order returns, or it can be informational, such as the sharing of inventory and customer order data. A) purpose B) means C) availability D) direction Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 16) Which of the following refers to the way organizations share their information? A) means B) purpose C) availability D) intent Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 17) ________ refers to the methods by which information is transmitted. A) Direction B) Means C) Purpose D) Availability Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) As a factor affecting supply chain performance, inventory includes all of the materials in the supply chain, including raw materials, in-process work, and finished goods. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 19) Increasing the size of an inventory reduces the cost of the inventory. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 20) Decreasing the size of an inventory decreases the odds that an item will be unavailable for purchase. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept 21) What is a supply chain? What are the four drivers that are crucial to the success of a supply chain? Answer: A supply chain is a network of organizations and facilities that transform raw materials into products delivered to customers. In a typical supply chain, customers order from retailers, who, in turn, order from distributors, who, in turn, order from manufacturers, who, in turn, order from suppliers. The supply chain also includes transportation companies, warehouses, and inventories, and some means for transmitting messages and information among the organizations involved. Four major factors, or drivers, affect supply chain performance: facilities, inventory, transportation, and information. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.3: What factors affect supply chain performance? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
22) ________ is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. A) Supply chain sustainability B) Supply chain compatibility C) Supply chain profitability D) Supply chain feasibility Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.4: How does supply chain profitability differ from organizational profitability? Classification: Concept 23) Each organization in a supply chain is an independent company with its own objectives. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.4: How does supply chain profitability differ from organizational profitability? Classification: Concept 24) Profitability of a supply chain increases if all the organizations in the supply chain operate at their maximum profitability. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.4: How does supply chain profitability differ from organizational profitability? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
25) Define supply chain profitability. How is it different from individual organizational profitability? Answer: Supply chain profitability is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. In general, the maximum profit to the supply chain will not occur if each organization in the supply chain maximizes its own profits in isolation. Usually, the profitability of the supply chain increases if one or more of the organizations operate at less than their own maximum profitability. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.4: How does supply chain profitability differ from organizational profitability? Classification: Concept 26) The phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain is referred to as the ________. A) synergistic effect B) flanging effect C) stack effect D) bullwhip effect Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 27) Which of the following statements is true of the bullwhip effect? A) It forces suppliers and manufacturers to carry smaller inventories than necessary. B) It is a natural dynamic that occurs because of the multistage nature of the supply chain. C) It is strongly associated with erratic consumer demand. D) It increases the overall profitability of the supply chain. Answer: B AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
28) Because of the nature of the bullwhip effect, the maximum variation in demand is faced by ________. A) suppliers B) manufacturers C) distributors D) retailers Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 29) The bullwhip effect explains the amplification of demand at various stages of a supply chain. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 30) The large fluctuations of the bullwhip effect force organizations to stock fewer inventories than needed. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 31) The bullwhip effect increases if all the participants in the supply chain have an access to consumer-demand information from the retailer. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
32) Inter-enterprise information systems are necessary to share consumer-demand information. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 33) True demand is the demand from the only party that introduces money into the system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept 34) Explain the bullwhip effect with an example. Answer: The bullwhip effect is a phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier. In a famous study, the bullwhip effect was observed in Procter & Gamble's supply chain for diapers. The number of babies determines diaper demand, and that number is constant or possibly slowly changing. Retailers do not order from the distributor with the sale of every diaper package. The retailer waits until the diaper inventory falls below a certain level, called the reorder quantity. Then the retailer orders a supply of diapers, perhaps ordering a few more than it expects to sell to ensure that it does not have an outage. The distributor receives the retailer's orders and follows the same process. It waits until its supply falls below the reorder quantity, and then it reorders from the manufacturer, with perhaps an increased amount to prevent outages. The manufacturer, in turn, uses a similar process with the raw-materials suppliers. Because of the nature of this process, small changes in demand at the retailer are amplified at each stage of the supply chain. These small changes become quite large variations on the supplier end. The large fluctuations of the bullwhip effect force distributors, manufacturers, and suppliers to carry larger inventories than should be necessary to meet the real consumer demand. Thus, the bullwhip effect reduces the overall profitability of the supply chain. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.5: What is the bullwhip effect? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
35) The ________ is used as the measure of supply chain speed. A) dollar value of goods exchanged in a given period of time B) amount of goods exchanged in a given period of time C) total profit generated by the components of supply chain D) time taken to transport goods from one component to another Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept 36) Which of the following is an effect of information systems on supply chain performance? A) reduced costs of buying and selling B) reduced supply chain speed C) increased size and costs of inventories D) optimized supply chain profitability Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept 37) The cloud storage has increased the costs of integrating an organization's information systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept 38) Information systems have the capability to eliminate the bullwhip effect. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
39) Information systems have enabled suppliers to increase the size of their inventories which decreased their profits. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept 40) How do information systems affect supply chain performance? Answer: Information systems, such as customer relationship management (CRM) and ecommerce sales systems have dramatically reduced the costs of buying and selling. Sourcing, buying, and selling have all become faster, easier, more effective, and less costly. Distributed systems in the cloud have enabled businesses to integrate their information systems with less cost and greater speed and agility than ever before. The presence of information systems has also expanded supply chain speed. Information systems have enabled both suppliers and customers to reduce the size of their inventories and, thus, reduce their inventory costs. Information systems also improve delivery scheduling. Using information systems, suppliers can deliver materials and components at the time and in the sequence needed. Such delivery enables just-in-time inventory, and it allows manufacturers to reduce raw materials inventory size as well as the handling of raw materials. AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss the role of information systems in supply chain management and performance. Learning Obj: LO 22.6: How do information systems affect supply chain performance? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 11 Enterprise Social Networks and Knowledge Management 1) Which of the following is true of social media (SM)? A) Using social media is an old-style, organization-centered technique. B) Social media is used for sending messages and attempts to manage, influence, and control customers and partners. C) Organizations know social media is popular and can be strategically beneficial. D) Social media markets to employees and not customers. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 2) Which of the following is the first step in developing a social media information system (SMIS)? A) Define what the organization wants to achieve with social media. B) Identify metrics that will indicate whether an organization has achieved its goals. C) Maximize metrics like conversion rate and bounce rate. D) Identify the organization's target audience. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 3) ________ indicate whether an organization has achieved its goals. A) Vanity metrics B) Cyclomatic complexities C) Halstead complexities D) Success metrics Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) A(n) ________ is the percent of people who achieve a certain result for an organization. A) bounce rate B) exit rate C) exchange rate D) conversion rate Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 5) A(n) ________ refers to the percent of people who visit a Web site and then immediately leave. A) bounce rate B) exit rate C) exchange rate D) conversion rate Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 6) Which of the following statements is true of identifying an organization's target audience in a social media information system (SMIS)? A) Every social media user is a target audience. B) Only teenagers form the target audience. C) Identifying a target audience helps organizations focus its marketing efforts. D) Once a target audience is identified, any social media platform can be used. Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) ________ is performed to identify the strengths and weaknesses in an opponent's use of social media in a social media information system (SMIS). A) Factor analysis B) Risk analysis C) Win-loss analytics D) Competitive analysis Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 8) All companies have teams who are trained to use social media (SM). Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 9) Depending on an organization's strategy, it will use different social media platforms in different ways. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 10) Success metrics are also known as key performance indicators (KPIs). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Metrics that sound good but do not improve one's decision making are commonly referred to as vanity metrics. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 12) Conversion rate refers to the percent of people that visit a Web site and then immediately leave. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 13) Explain briefly how organizations view a social media information system (SMIS). Answer: Many companies are still unsure how to use social media (SM). They want to use it, but they're not quite sure how to do so in a way that facilitates their existing competitive strategy. Competitive strategies can focus on being the cost leader or on differentiating one's products from one's competition. An organization can then employ this strategy across an entire industry, or it can focus on a particular segment within that industry. Depending on an organization's strategy, it will use different SM platforms in different ways. Again, the key is the premeditated alignment of the social media information system (SMIS) with the organization's chosen strategy. Organizations know SM is popular and can be strategically beneficial. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.1: How do organizations develop an effective SMIS? Classification: Concept 14) A(n) ________ is a software platform that uses social media to facilitate cooperative work of people within an organization. A) enterprise social network B) content management system C) earned value management D) expert system Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.2: What is an enterprise social network (ESN)? Classification: Concept 4 Copyright © 2016 Pearson Education, Inc.
15) A(n) ________ refers to a content structure employed by Enterprise social networks (ESNs) that emerges from the processing of many user tags. A) heteronomy B) agronomy C) folksonomy D) cytotaxonomy Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.2: What is an enterprise social network (ESN)? Classification: Concept 16) Enterprise social networks (ESNs) use outward-facing social media platforms like Facebook and Twitter. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.2: What is an enterprise social network (ESN)? Classification: Concept 17) Using enterprise social networks (ESNs), employees can bypass managers and post ideas directly for the CEO to read. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.2: What is an enterprise social network (ESN)? Classification: Concept 18) What is an enterprise social network (ESN)? Answer: An enterprise social network (ESN) is a software platform that uses social media (SM) to facilitate cooperative work of people within an organization. Instead of using outward-facing SM platforms like Facebook and Twitter, ESNs use specialized enterprise social software designed to be employed inside the organization. These applications may incorporate the same functionality used by traditional social media, including blogs, microblogs, status updates, image and video sharing, personal sites, and wikis. The primary goal of ESNs is to improve communication, collaboration, knowledge sharing, problem solving, and decision making within organizations. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 23.2: What is an enterprise social network (ESN)? Classification: Concept 5 Copyright © 2016 Pearson Education, Inc.
19) The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it is called ________. A) knowledge management B) value engineering C) knowledge engineering D) earned value management Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.3: What are the benefits of knowledge management? Classification: Concept 20) Knowledge management can improve the effectiveness and efficiency of a process. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.3: What are the benefits of knowledge management? Classification: Concept 21) Expert systems came into existence long after the use of social media and the Internet. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.3: What are the benefits of knowledge management? Classification: Concept 22) What is knowledge management? How does it benefit an organization? Answer: Knowledge management (KM) is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need it. KM existed in the days before social media. KM benefits organizations in two fundamental ways: 1) It improves process quality. 2) It increases team strength. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.3: What are the benefits of knowledge management? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
23) ________ are rule-based systems that encode human knowledge in the form of If/Then rules. A) Document management systems B) Expert systems C) Content management systems D) Enterprise resource planning systems Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.4: What are expert systems? Classification: Concept 24) Which of the following is a disadvantage of expert systems? A) They cannot be updated to meet the changes in technology. B) They cannot consist of more than one If/Then rule. C) They are difficult to develop and maintain. D) The system's knowledge is available only to high-skilled experts. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.4: What are expert systems? Classification: Concept 25) Which of the following statements is true of expert systems? A) Small changes in the rules can cause unexpected outcomes. B) The programs that process a set of rules are called expert systems codes. C) They are easy to maintain because of their rule-based nature. D) They require very few labor hours from both experts and designers. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.4: What are expert systems? Classification: Concept 26) Expert systems are easy to maintain. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.4: What are expert systems? Classification: Concept 7 Copyright © 2016 Pearson Education, Inc.
27) What are expert systems? Answer: Expert systems are rule-based systems that encode human knowledge in the form of If/Then rules. Such rules are statements that specify if a particular condition exists, then some action should be taken. A real-world expert system may consist of hundreds, if not thousands, of rules. The programs that process a set of rules are called expert systems shells. Typically, the shell processes rules until no value changes. At that point, the values of all the variables are reported as results. To create the system of rules, the expert system development team interviews human experts in the domain of interest. Expert systems are difficult and expensive to develop and maintain. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.4: What are expert systems? Classification: Concept 28) ________ are information systems that support the management and delivery of documents and other expressions of employee knowledge. A) Document management systems B) Enterprise resource systems C) Expert systems D) Content management systems Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 29) Which of the following is a challenge for content management systems (CMS)? A) Content databases cannot hold large numbers of documents. B) Documents exist in isolation from each other. C) The systems must maintain linkages among documents. D) CMS content is static. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
30) Which of the following statements is true of the content management application alternatives? A) In-house systems are far less expensive to maintain than off-the-shelf products. B) Organizations develop an in-house system to track machine maintenance procedures. C) Custom content management applications are economical to develop and maintain. D) Off-the-shelf products have considerably less functionality than most in-house systems. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 31) The largest collection of documents ever assembled exists on the Internet, and the world's best known document search engine is ________. A) Yahoo B) Bing C) Google D) AltaVista Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 32) Content management systems cannot store graphics. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 33) Documents in content management systems exist in isolation from each other. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
34) Document contents in content management systems are perishable. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 35) Custom content management applications are expensive to develop and maintain. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 36) In-house systems have considerably more functionality than off-the-shelf products and are far less expensive to maintain. Answer: FALSE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 37) Software is the only component present in a content management system. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 38) It is often easier for an employee of an organization to find a document of the organization using Google than using an in-house search engine. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 23.5: What are content management systems? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
39) What are content management systems? Define the challenges of content management. Answer: Content management systems (CMS) are information systems that support the management and delivery of documents and other expressions of employee knowledge. Typical users of content management systems are companies that sell complicated products and want to share their knowledge of those products with employees and customers. Content management systems face serious challenges. First, most content databases are huge; some have thousands of individual documents, pages, and graphics. The second challenge is that CMS content is dynamic. Another complication for content management systems is that documents do not exist in isolation from each other. Documents refer to one another, and multiple documents may refer to the same product or procedure. When one of them changes, others must change as well. To manage these connections, content management systems must maintain linkages among documents so that content dependencies are known and used to maintain document consistency. A fourth complication is that document contents are perishable. Documents become obsolete and need to be altered, removed, or replaced. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept 40) What are the alternatives to content management applications? Answer: Three common alternatives for content management applications are: 1) In-house custom applications: In the past, organizations developed their own in-house content management applications. A customer support department, for example, might develop in-house database applications to track customer problems and their resolution. Operations might develop an in-house system to track machine maintenance procedures. Like all custom applications, however, custom content management applications are expensive to develop and maintain. 2) Off-the-shelf applications: Because of the expense of custom applications, many organizations today use off-the-shelf software. Some organizations choose vertical market offthe-shelf applications. Off-the-shelf products have considerably more functionality than most inhouse systems and they are far less expensive to maintain. 3) Public search engines: The largest collection of documents ever assembled exists on the Internet, and the world's best-known document search engine is Google. Because Google searches through all public sites of all organizations, it is usually the fastest and easiest way to find a public document. This often is true even within an organization. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 23.5: What are content management systems? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 12 Database Marketing 1) Which of the following marketing techniques refers to the application of business intelligence systems to the planning and execution of marketing programs? A) ambush marketing B) viral marketing C) database marketing D) guerrilla marketing Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.1: What is a database marketing opportunity? Classification: Concept 2) Databases are not a key component of database marketing. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.1: What is a database marketing opportunity? Classification: Concept 3) Data mining techniques are essential for database marketing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.1: What is a database marketing opportunity? Classification: Concept 4) What is database marketing? Answer: Database marketing is the application of business intelligence systems to the planning, execution, and assessment of marketing programs. Databases are a key component of database marketing, but data mining techniques are also very important. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.1: What is a database marketing opportunity? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
5) ________ is a way of analyzing and ranking customers according to their purchasing patterns. A) Composite forecast B) RFM analysis C) Regression analysis D) Delphi technique Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 6) Which of the following is the first step in the process of producing an RFM score? A) dividing the customers according to the amount spent on purchases B) sorting customer purchase records based on the purchase frequency C) sorting customer purchase records by the date of most recent purchase D) dividing customers into two groups based on the gender and giving each group a score Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 7) In RFM analysis, an R score of 5 shows that ________. A) a customer has not made any recent purchases B) a customer has bought the most expensive items C) a customer has frequently ordered expensive items D) a customer has purchased the least expensive items Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 8) In RFM analysis, an F score of 1 shows that ________. A) a customer has bought the least expensive items B) a customer has frequently placed orders C) a customer has always bought the most expensive items D) a customer has rarely made a purchase Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
9) In RFM analysis, customers who have bought the least expensive items are indicated by an M score of ________. A) 2 B) 5 C) 1 D) 4 Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 10) Cheryl Inc., a leading cosmetics manufacturer, wants to identify its most valued customers. Each customer is assigned an RFM score based on their purchasing patterns. One of their valued customers has an RFM score of 545. In this case, the ideal action for Cheryl's sales team is to ________. A) up-sell more expensive goods to this customer B) contact this customer immediately C) not waste any time on this customer D) set up an automated contact system for this customer Answer: C AACSB: Analytical Thinking Difficulty: Difficult Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Application 11) Which of the following RFM scores refers to the most valuable customer? A) 111 B) 555 C) 123 D) 333 Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) The RFM score is obtained by ranking customers based on the positive feedback for a product after purchasing it. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 13) RFM analysis is a complex technique that is difficult to implement. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 14) A high F score denotes that the customer has bought an expensive item recently. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 15) Customers with an RFM score of 555 are highly valued by organizations. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 16) The frequency of customer purchases is not a determining factor for RFM scores. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
17) RFM analysis can be a useful tool to determine the best customers based on the frequency of their purchases. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 18) RFM scores are basically beneficial to salespeople, as it gives a clear picture of a customer's buying pattern. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 19) A reporting system that generates RFM data can be automated. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
20) Describe the process of conducting RFM analysis. Answer: RFM analysis is a way of analyzing and ranking customers according to their purchasing patterns. It is a simple technique that considers how recently (R) a customer has ordered, how frequently (F) a customer orders, and how much money (M) the customer spends per order. To produce an RFM score, the program first sorts customer purchase records by the date of most recent (R) purchase. In a common form of this analysis, the program then divides the customers into five groups and gives customers in each group a score of 1 to 5. The 20 percent of the customers having the most recent orders are given an R score of 1, the 20 percent of the customers having the next most recent orders are given an R score of 2, and the last 20 percent are given an R score of 5. The program then re-sorts the customers on the basis of how frequently they order. The 20 percent of the customers who order most frequently are given an F score of 1, the next 20 percent of most frequently ordering customers are given a score of 2, and the least frequently ordering customers are given an F score of 5. Finally, the program sorts the customers again according to the amount spent on their orders. The 20 percent who have ordered the most expensive items are given an M score of 1, the next 20 percent are given an M score of 2, and the 20 percent who spend the least are given an M score of 5. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.2: How does RFM analysis classify customers? Classification: Concept 21) Which of the following is a data mining technique for determining sales patterns? A) RFM analysis B) market-basket analysis C) composite analysis D) regression analysis Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
22) In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. A) relationship selling B) cross-selling C) value added selling D) persuasive selling Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 23) In market-basket terminology, the term used to represent the probability that two items will be purchased together is ________. A) confidence B) support C) cohesion D) assurance Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 24) In market-basket terminology, a conditional probability estimate is referred to as ________. A) support B) cohesion C) confidence D) chance Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
25) In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) cohesion B) support C) confidence D) lift Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 26) ________ shows how much the base probability increases or decreases when other products are purchased. A) Lift B) Support C) Confidence D) Cohesion Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 27) A market-basket analysis shows the products that customers tend to buy together. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 28) A market-basket analysis is used to explore cross-selling opportunities. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) The more frequently two items occur in the same transaction, the higher the probability of them being purchased together. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 30) A cross-selling opportunity is created when a consumer purchases only a single product. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 31) The ratio of confidence to the base probability of buying an item is called support. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 32) What is a market-basket analysis? Answer: A market-basket analysis is a data mining technique for determining sales patterns. A market-basket analysis shows the products that customers tend to buy together. This gives companies an opportunity to cross-sell. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept 33) Define the three market-basket terminologies: support, confidence, and lift. Answer: In market-basket terminology, support is the probability that two items will be purchased together. A conditional probability estimate is called the confidence. The ratio of confidence to the base probability of buying an item is called lift. Lift shows how much the base probability increases or decreases when other products are purchased. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.3: How does market-basket analysis identify cross-selling opportunities? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
34) Which of the following techniques uses a hierarchical arrangement of criteria to predict a classification or value? A) market-basket analysis B) RFM technique C) Cooke method D) decision tree Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept 35) Which of the following is the basic idea of the decision tree technique? A) to perform an RMF analysis and rank consumers according to their purchasing patterns B) to select attributes that are most useful for classifying entities on some criterion C) to produce computer programs for information systems D) to use the minimum difference among groups created by the decision tree algorithm Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept 36) Which of the following statements is true about decision trees? A) Few decision trees can be transformed into a set of If/Then rules. B) Decision tree analysis is a supervised data mining technique. C) The algorithms used in decision trees are similar to each other. D) Decision tree programs produce computer programs for trees set up by analysts. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept 37) Decision tree analysis is a data mining technique that requires a high degree of supervision. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
38) Groups created by decision tree algorithms are as different from each other as possible. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept 39) A minimum difference among groups is used as the criterion for constructing the decision tree. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept 40) What are decision trees? How do they classify people into groups? Answer: A decision tree is a hierarchical arrangement of criteria that predicts a classification or value. Decision tree analysis is an unsupervised data mining technique. An analyst sets up a computer program and provides the data to analyze, and the decision tree program produces the tree. The basic idea of a decision tree is to select attributes that are most useful for classifying entities on some criterion. The user should input data about different attributes into the decision tree program. The program then analyzes all of the attributes and selects an attribute that creates the most disparate groups. The logic is that more different the groups, the better the classification will be. A decision tree program creates groups that are as pure as possible. A common business application of decision trees is to classify loans by likelihood of default. AACSB: Information Technology Difficulty: Easy Course LO: Explain how information systems can be used to assist in decision making. Learning Obj: LO 24.4: How do decision trees identify market segments? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 13 Reporting Systems and OLAP 1) A(n) ________ enables people to create information by processing data from disparate data sources and delivering that information to the proper users on a timely basis. A) operating system B) reporting system C) intrusion detection system D) domain name system Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.1: How do reporting systems enable people to create information? Classification: Concept 2) The sales manager of a retail store wants a list of customers who have made more than three repeat purchases from the store. Which of the following operations of a reporting system would help the sales manager obtain such a list? A) categorizing B) calculating C) grouping D) filtering Answer: D AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.1: How do reporting systems enable people to create information? Classification: Application 3) Which of the following types of reports is an example of a push report? A) static report B) dynamic report C) query report D) online analytical processing (OLAP) report Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.1: How do reporting systems enable people to create information? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Reporting systems cannot generate reports that require calculations on data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 25.1: How do reporting systems enable people to create information? Classification: Concept 5) What are reporting systems? What are the fundamental operations they perform? Answer: A reporting system is an information system that creates information by processing data from disparate sources and delivering that information to the proper users on a timely basis. Reporting systems manipulate data into meaningful context using four fundamental operations: (1) filtering data, (2) sorting data, (3) grouping data, and (4) making simple calculations on the data. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.1: How do reporting systems enable people to create information? Classification: Concept 6) Which of the following describes the reports, users, groups, roles, events, and other entities involved in the reporting activities of a reporting system? A) network packets B) data structures C) metadata D) microdata Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 7) ________ are used by a reporting system to prepare and deliver reports to proper users on a timely basis. A) Metadata B) Microdata C) Network packets D) Data structures Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Reports that are not subject to change and are prepared from underlying data are referred to as ________. A) exception reports B) static reports C) subscription reports D) dynamic reports Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 9) Reports that are updated and generated by a reporting system at the time of creation are referred to as ________. A) exception reports B) static reports C) query reports D) dynamic reports Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 10) A report on the current stock prices in the market is an example of a(n) ________. A) static report B) dynamic report C) exception report D) query report Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Reports that are prepared in response to data entered by users are termed ________. A) query reports B) static reports C) dynamic reports D) online analytical processing(OLAP) reports Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 12) Which of the following types of reports allows users to dynamically change the report grouping structures? A) query reports B) static reports C) dynamic reports D) online analytical processing (OLAP) reports Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 13) Which of the following is an electronic report medium that can be customized for a particular user? A) Web site B) email alert C) digital dashboard D) PDF file Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
14) Reports that users receive when they declare that they wish to receive notifications of events via email or on their cell phones are known as ________. A) query reports B) subscriptions C) exception reports D) alerts Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 15) Which of the following does a user receive without any activity on his or her part? A) pull report B) push report C) subscription D) alert Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 16) A pull report refers to a report ________. A) sent to users according to a preset schedule B) about the functioning of an organization's information systems C) generated by user request D) prepared by an organization from a competitor's data Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
17) Which of the following report media is used for delivering a query report? A) paper and PDF file B) digital dashboard C) Web site D) alerts via email Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 18) A reporting system uses metadata to prepare and deliver reports to proper users on a timely basis. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 19) Query reports allow users to dynamically change the report grouping structures. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 20) A report on the current stock prices in the market is an example of a static report. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 21) Alerts generated on the basis of user notification are not treated as reports. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
22) Push reports are generated only on receiving a user request. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 23) How does a reporting system obtain the necessary data to generate reports? Answer: Data from disparate data sources are read and combined, using filtering, sorting, grouping, and simple calculating, to produce information. Some data are generated within an organization, other data are obtained from public sources, and still other data may be purchased from data utilities. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 24) Explain the different types of reports. Answer: The different types of reports are static reports, dynamic reports, query reports, and online analytical processing (OLAP) reports. Static reports are prepared once from underlying data, and they do not change. A report of past year's sales, for example, is a static report. Other reports are dynamic; at the time of creation, the reporting system reads the most current data and generates the report using that fresh data. A report on sales today and a report on current stock prices are both dynamic reports. Query reports are prepared in response to data entered by users. Online analytical processing (OLAP) is a fourth type of report. OLAP reports allow users to dynamically change report grouping structures and to sum, count, average, and perform other simple arithmetic operations on groups of data. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept 25) What is the difference between push and pull reports? Answer: Organizations send a push report to users according to a preset schedule. Users receive the report without any activity on their part. In contrast, users must request a pull report. To obtain a pull report, a user goes to a Web portal or digital dashboard and clicks a link or button to cause the reporting system to produce and deliver the report. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.2: What are the components and characteristics of reporting systems? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
26) ________ involves connecting to data sources, creating report structures, and formatting reports. A) Report evaluation B) Report authoring C) Report monitoring D) Report delivery Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.3: How are reports authored, managed, and delivered? Classification: Concept 27) The ________ in a reporting system indicate the channel to be used for sending a report to a user and whether the report is to be pushed or pulled. A) metadata B) microdata C) network packets D) data structures Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.3: How are reports authored, managed, and delivered? Classification: Concept 28) The ________ function of a reporting system pushes reports or allows them to be pulled according to report management metadata. A) report authoring B) report monitoring C) report delivery D) report evaluation Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.3: How are reports authored, managed, and delivered? Classification: Concept 29) For query reports, the report delivery system serves as an intermediary between a user and a report generator. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.3: How are reports authored, managed, and delivered? Classification: Concept 8 Copyright © 2016 Pearson Education, Inc.
30) Explain report authoring, management, and report delivery. Answer: Report authoring involves connecting to data sources, creating a report structure, and formatting the report. Organizations can author reports by using a developer tool like Microsoft's Visual Studio. The purpose of report management is to define who receives what reports, when, and by what means. Most report management systems allow a report administrator to define user accounts and user groups and to assign particular users to particular groups. The report delivery function of a reporting system pushes reports or allows them to be pulled according to report management metadata. Reports can be delivered via an email server, via a Web site, via SOA services, or by other program-specific means. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.3: How are reports authored, managed, and delivered? Classification: Concept 31) Which of the following types of reports has the ability to sum, count, average, and perform other simple arithmetic operations on groups of data? A) query reports B) static reports C) database reports D) online analytical processing (OLAP) reports Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 32) In an online analytical processing (OLAP) report, a data item that is to be processed is called a ________. A) measure B) dimension C) cube D) target Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
33) Which of the following is an example of a measure in an online analytical processing (OLAP) report? A) sales region B) average cost C) customer location D) customer type Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 34) In an online analytical processing (OLAP) report, the purchase date is an example of a(n) ________. A) measure B) attribute C) dimension D) variable Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 35) In the case of online analytical processing (OLAP), a presentation of a measure with associated dimensions is referred to as an ________. A) OLAP database B) OLAP server C) OLAP service D) OLAP cube Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
36) An online analytical processing (OLAP) cube can also be referred to as an ________. A) OLAP database B) OLAP report C) OLAP service D) OLAP server Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 37) Which of the following is a drawback of online analytical processing (OLAP) reports? A) They have a single or no dimension. B) Their format is static in nature. C) They require a lot of computing power. D) They can perform arithmetic operations only on single sets of data. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 38) Which of the following statements is true of dimensional databases? A) They store millions of static online analytical processing (OLAP) reports. B) They are structured to support OLAP processing. C) They specialize in sorting functions alone. D) They specialize in filtering functions alone. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 39) In online analytical processing (OLAP) reports, a dimension refers to an item that is to be processed in the report. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
40) An online analytical processing (OLAP) cube is a characteristic of a measure in an OLAP report. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 41) Users are not allowed to alter the format of online analytical processing (OLAP) reports. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 42) The process of dividing the data in online analytical processing (OLAP) reports into more details is termed drill down. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept 43) An online analytical processing (OLAP) server reads data from an operational database, performs preliminary calculations, and stores the results of those calculations in an OLAP database. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
44) Describe online analytical processing (OLAP). Answer: Online analytical processing (OLAP) provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. A remarkable characteristic of OLAP reports is that their format is dynamic. The viewer of a report can change the report's structure. An OLAP report has measures and dimensions. A measure is the data item of interest. It is the item that is to be summed or averaged or otherwise processed in the OLAP report. A dimension is a characteristic of a measure. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for using and managing databases. Learning Obj: LO 25.4: How are OLAP reports dynamic? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 14 Data Breaches 1) A(n) ________ is said to happen when an unauthorized person views, alters, or steals secured data. A) data breach B) asynchronous communication C) key escrow D) sequence flow Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 2) According to the reports in Ponemon's 2014 Cost of Data Breach Study, the average costs per stolen record were the highest in the ________ industry. A) transportation B) advertising C) automobile D) healthcare Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 3) Which of the following is a direct cost of handling a data breach? A) loss of reputation B) abnormal customer turnover C) legal fees and consultation D) increased customer acquisition activities Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Sam is a hacker who makes money by stealing and selling credit cards. He has targeted the employees of a local firm and is looking for details such as names, addresses, dates of birth, social security numbers, credit card numbers, or health records. In this case, Sam is looking for ________. A) firewall security measures B) business continuity plans C) malware definitions D) personally identifiable information Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Application 5) ________ refers to the process of placing a small charge on a credit card to ensure it is working. A) Hoarding B) Carding C) Phishing D) Credit card hijacking Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 6) According to the reports in Ponemon's 2014 Cost of Data Breach Study, organizations are more likely to lose larger amounts of data than smaller amounts of data. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 7) Personally identifiable information includes a person's bank account numbers, personal identification numbers, email address, and social security numbers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Stolen credit card information is validated through a process called carding. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 9) Explain how hackers use information stolen from data breaches for credit card forgery. Answer: Over 67 percent of data breaches come from hackers trying to make money. Hackers are primarily looking for personally identifiable information (PII), or data that can be used to identify a person. This includes names, addresses, dates of birth, social security numbers, credit card numbers, health records, bank account numbers, personal identification numbers, and email addresses. Stolen information is commonly used for credit card fraud. Stolen credit card information is validated through a process called carding, where a small charge is placed on the card to ensure it is working. Valid cards are then bundled and sold on the black market. The price of stolen credit cards can run from $20 to $40 per card, depending on the type of account. Stolen data is commonly used for identity theft, extortion, and industrial espionage. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.1: What is a data breach? Classification: Concept 10) The first step in protecting oneself from data breaches is ________. A) securing credit and debit card details B) understanding how they happen C) learning the technologies used for these activities D) installing necessary software to protect from possible breaches Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) ________ refers to a software used by hackers to take advantage of a newly discovered vulnerability in a target's application or operating system. A) Exploit B) Attack vector C) Data breach D) Wardriver Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 12) A group of hackers use a targeted phishing attack to breach a company's firewalls and hack into its security system. Which of the following techniques have the hackers used? A) pretexting B) IP spoofing C) spear phishing D) phone phishing Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 13) A group of hackers decide to steal credit card details of the users of Swift Shopping Inc., a leading e-commerce company. They infect the security system of the company's third-party vendor and gain access into its internal network. They compromise an internal Windows server of the company and use a malware to extract customer data. Which of the following is illustrated in this scenario? A) hardening B) carding C) pretexting D) data breaching Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Application
4 Copyright © 2016 Pearson Education, Inc.
14) Each type of data breach is different because hackers are continually developing new tools and techniques that enable them to steal more data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 15) Attack vectors refer to the ways hackers attack a target. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 16) An exploit is a type of attack vector used by hackers. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 17) Spear phishing is used by organizations to monitor traffic passing through their internal network. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) Explain how data breach occurs with an example. Answer: Hackers are continually developing new tools and techniques that enable them to steal more data. They experiment with new attack vectors, or ways of attacking a target. In the data breach that occurred at Target Corporation in late 2013, attackers first purchased malware designed specifically for the attacks they planned to carry out. They then used spear phishing, or a targeted phishing attack, to infect a Target third party vendor's system and gather keystrokes, login credentials, and screenshots from the vendor's users. The attackers used this information to gain access into Target's internal network. Once inside Target's network, the attackers compromised an internal Windows file server. From this server, the attackers used malware named Trojan.POSRAM to extract customer data from point-of-sale (POS) terminals. Customer data was continuously sent from the POS terminals to an extraction server within Target's network. It was then funneled out of Target's network to drop servers in Russia, Brazil, and Miami. From there, the data was collected and sold on the black market. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.2: How do data breaches happen? Classification: Concept 19) The process of illegally transferring data out of an organization is known as ________. A) exfiltrating B) carding C) hardening D) pretexting Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 20) Which of the following is true of the measures to be taken by an organization in the event of a data breach? A) The organization must delay informing its users so that the occurrence of data breach remains private. B) The organization must not involve additional technical or law enforcement professional as it may lead to further damage to its data. C) The organization must destroy the evidence of the breach to avoid future security problems. D) The organization must respond quickly to mitigate the amount of damage hackers can do with the stolen data. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 6 Copyright © 2016 Pearson Education, Inc.
21) Executives, managers, and all systems personnel of an organization discuss the actions to be taken by each employee in case a data breach occurs. They identify areas that would need immediate attention and assign specific responsibilities to each employee. The employees of the organization are performing a(n) ________. A) exfiltration B) documentation C) walkthrough D) case study Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Application 22) The purpose of a business continuity planning session in an organization is to ________. A) discuss how to return the organization to normal operations as quickly as possible after a data breach B) build plans to increase the market presence of the organization and increase its user base C) identify new markets that will accelerate the growth of the organization D) understand the type of information stored by the organization and implement relevant security measures as required by regulatory laws Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 23) Which of the following should be done by employees to protect against data breaches? A) They should develop new exploits. B) They should remove existing honeypots. C) They should design methods for data extrusion. D) They should conduct a walkthrough. Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
24) Data breach notifications to users should include ________. A) the costs incurred due to the breach B) a sincere apology and an acceptance of responsibility for the incident C) a detail on how the breach occurred and the reasons for the breach D) a report on the current security measures Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Application 25) Data extrusion helps organizations secure their data from possible data breaches. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 26) Despite data breach, organizations should refrain from informing their users immediately as it will lead to mass user defection. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 27) Decisions on how to respond to a data breach are most effective if they are made when the breach is happening. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 28) Performing a walkthrough should be done as part of a business continuity planning session. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) Data breach notifications should state that the existing security policies and procedures are inadequate and that changes are being made to prevent similar breaches in the future. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 30) Why should organizations respond quickly to data breaches? Answer: Organizations need to respond to data breaches quickly for several reasons. First, by responding quickly an organization can stop hackers from doing more damage. Hackers can be prevented from accessing other internal systems, and affected systems can be patched and cleaned. Additionally, if organizations respond quickly enough, hackers may be prevented from exfiltrating, or illegally transferring, data out of the organization. Second, responding quickly may mitigate the amount of damage hackers can do with the stolen data. If the affected users are notified immediately they can change their passwords, cancel their credit cards, and possibly activate credit monitoring services. Third, the longer organizations delay in notifying users, the more upset users become. Based on past data breaches, users are reasonably forgiving of organizations that quickly notify them about what happened and what steps that are being taken to make things right. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
31) What are the steps involved in an organization's plan for a data breach? Answer: Data breaches aren't guaranteed to happen, but they are likely to happen. As a result, organizations need to plan for data breaches. They need to rehearse what they will do when a breach happens. Executives, managers, and systems personnel must perform a walkthrough and discuss the specific steps each person will take after a breach occurs. This should done as part of a broader business continuity planning session that discusses how to return the organization to normal operations as quickly as possible. As part of the planning process, organizations should form a computer security incident response team (CSIRT) consisting of staff from the legal and public relations departments, as well as executives and systems administrators. Coordinated preplanning for an incident helps organizations avoid missteps like accidentally destroying evidence and issuing poorly worded data breach notices to users. Decisions must be made before the incident, not while it's happening. Finally, as part of the planning process, organizations need to identify additional technical and law enforcement professionals that may need to be brought in to help handle the data breach. Evidence of the breach must be preserved, and the extent of the damage needs to be accurately measured. AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.3: How should organizations respond to data breaches? Classification: Concept 32) The ________ is a regulatory law that requires security precautions for government agencies. A) Federal Information Security Management Act (FISMA) B) Gramm-Leach-Bliley Act (GLBA) C) Payment Card Industry Data Security Standard (PCI DSS) D) Family Educational Rights and Privacy Act (FERPA) Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept 33) Which of the following regulatory laws requires data protection for financial institutions? A) the Family Educational Rights and Privacy Act (FERPA) B) the Federal Information Security Management Act (FISMA) C) the Gramm-Leach-Bliley Act (GLBA) D) the Health Information Portability and Accountability Act (HIPAA) Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
34) Adam owns and manages a large insurance company. In order to protect his organization from data breach, Adam has to ensure that he has incorporated the security measures required by the ________. A) Family Educational Rights and Privacy Act (FERPA) B) Federal Information Security Management Act (FISMA) C) Payment Card Industry Data Security Standard (PCI DSS) D) Gramm-Leach-Bliley Act (GLBA) Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Application 35) Venclave Hospital is a privately-owned organization that specializes in treating neurological diseases. Which of the following regulatory laws governs the data security measures to be taken by this hospital for protecting against data breach? A) the Health Maintenance Organization Act of 1973 B) the Health Information Portability and Accountability Act (HIPAA) C) the Gramm-Leach-Bliley Act (GLBA) D) the Federal Information Security Management Act (FISMA) Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Application 36) Which of the following regulatory laws requires data protection for health care institutions? A) the Gramm-Leach-Bliley Act (GLBA) B) the Federal Information Security Management Act (FISMA) C) the Health Information Portability and Accountability Act (HIPAA) D) the Health Maintenance Organization Act of 1973 Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
37) The ________ is a regulatory law that provides protection for student education records. A) Family Educational Rights and Privacy Act (FERPA) B) Equal Educational Opportunities Act of 1974 C) Smith-Lever Act of 1914 D) Federal Information Security Management Act (FISMA) Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept 38) Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept 39) The Federal Information Security Management Act (FISMA) details the procedures to be followed by a federal agency in case an organization fails to ensure the minimum security requirements for its data and systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept 40) The Gramm-Leach-Bliley Act (GLBA) is a universal regulatory law that applies to all types of industries. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
41) List some of the regulatory laws that govern the secure storage of data in certain industries. Answer: Organizations need to understand the body of regulatory law relative to the type of information they store because they will be held accountable for implementing those standards. A few prominent regulatory laws that govern the secure storage of data in certain industries are listed below. 1. The Federal Information Security Management Act (FISMA) requires security precautions for government agencies. 2. The Gramm-Leach-Bliley Act (GLBA), also known as the Financial Services Modernization Act, requires data protection for financial institutions. 3. The Health Information Portability and Accountability Act (HIPAA) requires data protection for health care institutions. 4. The Payment Card Industry Data Security Standard (PCI DSS) governs the secure storage of cardholder data. 5. The Family Educational Rights and Privacy Act (FERPA) provides protection for student education records. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the ethical and social issues raised by the use of information systems. Learning Obj: LO 26.4: What are the legal consequences of a data breach? Classification: Concept 42) ________ are software or procedures used to prevent an information security attack. A) Malware definitions B) Countermeasures C) Exploits D) Attack vectors Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept
13 Copyright © 2016 Pearson Education, Inc.
43) Talgedco Inc., a software company, has taken several steps to secure its systems and data. The company has also installed a network intrusion detection system and data loss prevention system. Employees of this company have also been trained on the procedures to be followed to reduce the probability of a data breach. These steps taken by Talgedco are an example of ________. A) attack vectors B) countermeasures C) malware D) exfiltration Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Application 44) A(n) ________ is used to examine traffic passing through an organization's internal network. A) honeypot B) attack vector C) security protocols open repository D) network intrusion detection system Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept 45) ________ are countermeasures designed to prevent sensitive data from being released to unauthorized persons. A) Malware definitions B) Attack vectors C) Data loss prevention systems D) Data extrusion prevention systems Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
46) Organizations can implement countermeasures that make data breaches impossible to occur. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept 47) It is easier for organizations to prepare a list of countermeasures against many different types of attacks and take appropriate measures accordingly. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept 48) An organization can easily stop a simple SQL injection attack on its online store by additional user training, stronger vendor authentication, or an internal network intrusion detection system. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept 49) What are countermeasures? Why is it important for organizations to implement countermeasures? Answer: Countermeasures are software or procedures used to prevent an attack. They make data breaches improbable, or unlikely to occur. Phishing detection software, user authentication systems, network intrusion detection systems, and data loss prevention systems are examples of countermeasures that can be taken by organizations. A network intrusion detection system (NIDS) used to examine traffic passing through an organization's internal network can identify possible attacks. Finally, data loss prevention systems (DLP), which are designed to prevent sensitive data from being released to unauthorized persons, can be used to stop the data from leaving the internal network. Such countermeasures help to detect and stop hacker activity at each step of data breaching. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
50) Explain the basic countermeasures to be taken by organizations to protect themselves against data breaches. Answer: There is no list of countermeasures for each type of data breach. Each attack is unique and requires its own set of countermeasures. As a starting point, however, organizations should appoint a chief information security officer (CISO) to ensure sufficient executive support and resources are given to the process of data protection. Organizations then need to implement security safeguards and appropriate data protections based on internal policies. In addition, special consideration should be given to regulatory requirements if the organization is storing certain types of sensitive data. Finally, organizations should form a computer security incidence report team, have a business continuity plan in place, and rehearse their incident response plan. AACSB: Information Technology Difficulty: Easy Course LO: Describe different methods of managing IS security. Learning Obj: LO 26.5: How can data breaches be prevented? Classification: Concept
16 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 15 International MIS 1) Which of the following statements is true of the international business scenario? A) After the dot-com bust, optical fiber was extremely scarce and expensive. B) After the fall of the Soviet Union, the economies of Russia and Western Europe closed their markets to the world. C) With the popularity of the Internet, the economies of North America and Europe became less integrated. D) With the popularity of the Internet, the Chinese economy became more open to the world. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 2) How has the global economy changed the competitive environment? A) Suppliers are not required to reach a wide range of customers. B) Customers now have less access to information about substitutes. C) It has intensified rivalry by increasing product and vendor choices. D) It has made it easier for new market entrants in all fields to penetrate the market. Answer: C AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 3) In the current age, global economy changes competitive strategies because it ________. A) enables unprecedented product differentiation B) makes communication between a company and its customer one-sided C) reduces the risk that a company has to bear D) eliminates the need for localizing products Answer: A AACSB: Analytical Thinking Difficulty: Moderate Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) How does the global economy change value chains and business processes? A) World time differences enable global virtual companies to operate 24/7. B) Overseas outsourcing is no longer an attractive option. C) It makes it difficult for an international company to conduct sales and marketing efforts locally. D) It makes it mandatory for the manufacturing activities to be carried out from the home country. Answer: A AACSB: Diverse and Multicultural Work Environments Difficulty: Moderate Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 5) With the fall of the Soviet Union, the economies of Russia and Eastern Europe became alienated from the rest of the world market. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 6) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service. Answer: TRUE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 7) The size of the world economy, combined with the Internet, limits product differentiation. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
8) Due to information systems, any value chain activity can be performed from anywhere in the world. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Explain how IS can be used to gain and sustain competitive advantage. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 9) World time differences restrict global virtual companies from operating 24/7. Answer: FALSE AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 10) How does the global economy change competitive strategy? Answer: The emerging global economy changes thinking about competitive strategies in two major ways. First, the sheer size and complexity of the global economy means that any organization that chooses a strategy allowing it to compete industry-wide is taking a very big risk. Competing in many different countries, with products localized to the language and culture of those countries, is an enormous and expensive task. The second major way today's world economy changes competitive strategies is that its size, combined with the Internet, enables unprecedented product differentiation. AACSB: Analytical Thinking Difficulty: Easy Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.1: How does the global economy affect organizations and processes? Classification: Concept 11) The emergence of ________ technologies has made it easier for companies all over the world to obtain the latest in server technology. A) international cloud B) big data C) data mining D) distributed database Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Describe the effects of e-commerce on the modern business world. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) The process of making a computer program work in a second language is called ________. A) differentiating B) stringing C) localizing D) optimizing Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 13) Which of the following statements is true about the issues to be addressed when localizing a computer program? A) When translating a user interface for a program, the entire user interface, except the icons, will need to be changed. B) Programming techniques can be used to simplify and reduce the cost of localization. C) Forms and reports should be localized in a manner that does not necessitate redesigning an entire document. D) The help text should always be maintained in English. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 14) Which of the following statements is true of localizing? A) Translating documents is less expensive, but more time consuming than localizing computer programs. B) Localizing computer programs primarily involves translating documents from one language to another. C) Localization of computer programs should be planned from the beginning. D) Localizing computer programs is easier than translating documents. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
15) Which of the following is an issue related to global databases? A) Data transmission speeds are too slow to process data from a single geographic location. B) A single database increases data integrity problems. C) A single database is ideal for companies that use multiple languages. D) With a single database, it is not possible to have an integrated view of a customer or an organization's operations. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 16) ________ database processing refers to the processing of a single database that resides in multiple locations. A) Clustered B) Distributed C) External D) Hypermedia Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 17) If a distributed database contains copies of the same data, it is called a ________ database. A) mirrored B) redundant C) replicated D) partitioned Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
18) If a distributed database divides the database into nonoverlapping segments, it is called a(n) ________ database. A) mirrored B) replicated C) independent D) partitioned Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 19) Which of the following is an advantage of functional systems? A) They facilitate the integration of data across various business functions. B) Two order-processing functional systems located in two different countries need not accommodate language and culture differences in a single system. C) They ensure that organizations do not suffer from islands of automation. D) They solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 20) Which of the following statements is true of inherent processes? A) Creating an accurate as-is international process management model is inexpensive and easy. B) Determining the criteria to be used for evaluating the alternative international processes takes little time. C) Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way. D) It is likely that international business processes will be developed more like intra-department business processes. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
21) The human components, such as procedures and people, are affected by language and culture. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 22) Information systems procedures, unlike business processes, need not reflect local cultural values and norms. Answer: FALSE AACSB: Diverse and Multicultural Work Environments Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 23) To localize a computer program, all you need to do is hire a translator to convert it from one language to another. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 24) International companies that have a single database must declare a single language for the company. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 25) Cross-functional, integrated systems, such as Enterprise Resource Planning (ERP), add to the problems of data isolation. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 7 Copyright © 2016 Pearson Education, Inc.
26) Differences in language, culture, norms, and expectations compound the difficulties of international process management. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 27) What are the issues that have to be addressed when localizing a computer program? Answer: The process of making a computer program work in a second language is called localizing. The following issues have to be addressed while localizing a computer program: a. The user interface, including menu bars and commands, has to be translated. b. The labels in forms, reports, and query prompts have to be translated and possibly redesigned. c. All documentation and help text have to be translated. d. All the diagrams and examples in the help text have to be redrawn and translated. e. All the error messages have to be translated. f. The text in all message boxes has to be translated. g. Sorting order for the different character sets has to be adjusted. h. Special problems in Asian character sets and in languages that read and write from right to left have to be fixed. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept 28) What are the problems of inherent processes? Answer: Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way. ERP vendors justify this standardization by saying that their procedures are based on industry-wide best practices and that the organization will benefit by following these standard processes. This statement may be true, but some inherent processes may conflict with cultural norms. If they do, it becomes difficult for the management to convince the employees in such cultures to follow those inherent processes. Differences in language, culture, norms, and expectations compound the difficulties of international process management. Just creating an accurate as-is model is difficult and expensive in itself; developing alternative international processes and evaluating them becomes incredibly challenging. With cultural differences, it becomes difficult to determine what criteria should be used for evaluating the alternatives and also for performing the evaluation. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.2: What are the characteristics of international IS components? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
29) The phenomenon in which the variability in the size and timing of orders increases at each stage of the supply chain is known as the ________ effect. A) Zeeman B) butterfly C) bullwhip D) Stroop Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 30) Because of the ________ effect, a dollar spent will contribute two or three dollars of activity to the economy. A) distribution B) bullwhip C) butterfly D) accelerator Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 31) Information systems increase inventories. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 32) Information systems are used to reduce or eliminate the bullwhip effect, hence, saving costs. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
33) Information systems support just-in-time (JIT) inventory techniques. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 34) The accelerator effect can increase the demand for a product. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 35) How do global information systems affect supply chain profitability? Answer: Global information systems increase supply chain profitability. Supply chain performance is driven by four factors: facilities, inventories, transportation, and information. Every one of these drivers is positively affected by global information systems. Because of global information systems, facilities can be located anywhere in the world. Information systems reduce inventories and hence save costs. They can be used to reduce or eliminate the bullwhip effect. They also support just-in-time (JIT) inventory techniques worldwide. Information systems allow businesses to choose the delivery option that optimizes the value they generate. Finally, global information systems produce comprehensive, accurate, and timely information. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 27.3: How do inter-enterprise IS facilitate globalization? Classification: Concept 36) Operating information systems (IS) internationally can be problematic because of different physical environments. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.4: What are the security challenges of international IS? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
37) Which of the following is true of the challenges of international information systems (IS) management? A) Standardizing business processes is a good method to overcome the challenges posed by international IS management. B) Running hardware using the cloud in different countries poses a problem. C) The procedures for using a customer relationship management system remain the same irrespective of the country where it is used. D) The purpose and the scope of a system are determined in the requirement analysis stage of the software development life cycle. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept 38) The purpose and scope of a system are determined in the systems definition stage of the Software Development Life Cycle (SDLC). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept 39) In the context of combatting the challenges of international information systems (IS) management, defining a set of standard business processes requires conversion of the organization to different work processes. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept 40) The development rate of international information systems varies among countries and cultures. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the role of information systems in supporting business processes. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
41) What are the challenges of international information systems (IS) management? Answer: Managing a global information systems development project is difficult because of project size and complexity. Project integration is difficult because international development projects require the complex integration of results from distributed workgroups. Also, task dependencies can span teams working in different countries, increasing the difficulty of task management. Time management becomes difficult because teams in different cultures and countries work at different rates. Some cultures have a 35-hour work week, and some have a 60-hour work week. Some cultures expect 6-week vacations, and some expect 2 weeks. Some cultures thrive on efficiency of labor, and others thrive on considerate working relationships. Thus, there is no standard rate of development for an international project. In terms of cost, different countries and cultures pay vastly different labor rates. Using critical path analysis, managers may choose to move a task from one team to another. Doing so, however, may substantially increase costs. Thus, management may choose to accept a delay rather than move work to an available but more expensive team. The complex trade-offs that exist between time and cost become even more complex for international projects. Quality and human resources are also more complicated for international projects. Quality standards vary among countries. Thus, the integration of programs of varying quality results in an inconsistent system. Worker expectations vary among cultures and nations. Compensation, rewards, and worker conditions vary, and these differences can lead to misunderstandings, poor morale, and project delays. Because of these factors, effective team communication is exceedingly important for international projects, but because of language and culture differences and geographic separation, such communication is difficult. Effective communication is also more expensive. Finally, project procurement is complicated by the normal challenges of international commerce. AACSB: Information Technology Difficulty: Difficult Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 27.5: What are the challenges of international IS management? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 16 Systems Development Project Management 1) Which of the following is a characteristic of large-scale systems development projects? A) short development intervals B) single development site C) avoidance of system localization D) 50-100 development team members Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept 2) Which of the following statements is true of large-scale systems development projects? A) They use simple computer programs to ensure consistency and speed in development. B) They use development teams of less than 20 members to reduce complexity. C) Their development involves the integration of services from several companies. D) Their development is carried out in a single site to ensure consistency. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept 3) The development of large-scale systems can involve the integration of products and services from different companies. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Large-scale systems development requires extended development intervals as long as 5 or 6 years. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept 5) What are the characteristics of information systems (IS) in large-scale systems development projects? Answer: Information systems (IS) in large-scale systems development project have many features and functions. They require substantial computer resources and necessitate the creation of multifaceted, complicated computer programs. They process databases with hundreds of tables; dozens, possibly hundreds, of relationships; and terabytes of data. Such large-scale systems affect many business processes and support hundreds, possibly thousands, of concurrent users. Because of their size, such systems require a large development team, often composed of 50 to 100 or more business and systems analysts, programmers, PQA engineers, and managers. To add further complexity, large-scale systems are often simultaneously developed at multiple sites. A project might involve teams in the United States, India, China, and other countries. Additionally, the development of large-scale systems can involve integrating products and services from different companies. In these larger development projects, some companies provide licensed software; others provide particular expertise, such as database design; and others provide development labor. Large-scale systems are frequently localized for different languages. Finally, large-scale systems development requires extended development intervals, sometimes as long as 5 or 6 years. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.1: Why is formalized project management necessary? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
6) Systems development projects require the balancing of three critical drivers: requirements, cost, and ________. A) scope B) time C) performance D) value Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept 7) Increasing the cost of a project can reduce the time required to complete the project up to a certain point, beyond which, the time required would increase due to ________. A) economies of scale B) diseconomies of scale C) economies of scope D) diseconomies of scope Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept 8) In the context of a systems development project, which of the following statements is true of the relationships between requirements, cost, and time? A) Increasing the time for the completion of a project always increases the cost of the project. B) Increasing the cost of a project will always reduce the time required to finish the project. C) Reducing the requirements in a project rarely affects the time required to finish the project. D) Reducing the number of requirements in a project reduces the overall cost of the project. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
9) A plan that stipulates the tasks to be accomplished in a project, the labor and other resources assigned to those tasks, and the schedule for completion of the project is called the ________. A) baseline B) data model C) line of code D) scatter plot Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept 10) The time involved in a project can always be reduced by increasing cost. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept 11) Larger projects with longer development intervals will find it easier to meet baseline requirements. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
12) What are the trade-offs in a systems development project's requirements, cost, and time? Answer: Systems development projects require the balancing of three critical drivers: requirements (scope), cost, and time. The requirements against the time and against the cost of a project can be traded off. If the requirements are reduced, a project would take less time to complete and the cost of the project will also decrease. The relationship between time and cost is more complicated. Normally, the time can be reduced by increasing cost, but only to a point, beyond which, the time to finish the project will actually increase due to diseconomies of scale. Thus, at some point, adding more people creates diseconomies of scale. In some projects, costs can be reduced by increasing time. However, this trade-off is not always true. By extending the project interval, one will need to pay labor and overhead for a longer period of time. Adding more time can, in this way, increase the cost of the project. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.2: What are the trade-offs in requirements, cost, and time? Classification: Concept 13) Which of the following is a technique that stipulates phases and processes for constructing information systems (IS) but does not address the management of large-scale projects? A) systems development life cycle B) rapid application development C) agile software development D) structured system analysis Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept 14) In the Project Management Body of Knowledge (PMBOK®) Guide, the different stages in the life of a project are referred to as ________. A) configuration controls B) knowledge areas C) process groups D) resource zones Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
15) ________ is the knowledge area that refers to the management of an entire project and the construction of the final product. A) Project integration B) Project management C) Procurement management D) Quality management Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept 16) ________ is a knowledge area that concerns the methods, media, and schedules for exchanging information with the project's sponsors within a team and with others who have an interest in the progress of the project. A) Procurement management B) Communications management C) Quality management D) Project integration Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept 17) ________ is a knowledge area that concerns contracts with outside vendors for services, materials, and outsourcing of functions. A) Communications management B) Quality management C) Project integration D) Procurement management Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
18) The Project Management Body of Knowledge (PMBOK®) Guide identifies those practices that are known to be effective for different situations and briefly describes their use. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept 19) Knowledge areas of the Project Management Body of Knowledge (PMBOK®) Guide refer to the factors in a project that need to be managed throughout the life of the project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept 20) What is the Project Management Body of Knowledge (PMBOK®) Guide for project management? Answer: Project Management Body of Knowledge (PMBOK®) Guide, compiled by the Project Management Institute (PMI), contains what many believe are the best project management processes, practices, and techniques. The document does not describe the details of each practice or technique but instead identifies those practices that are known to be effective for different situations and briefly describes their use. Versions of this document are denoted by the year in which they are published. As of 2013, the current version is "A Guide to the Project Management Body of Knowledge (PMBOK®) Guide, Fifth Edition." PMBOK® Guide is organized according to a grid, which shows five process groups and nine knowledge areas. The process groups refer to different stages in the life of a project. The nine knowledge areas refer to factors to be managed throughout the life of the project. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.3: What are the dimensions of project management? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
21) Each task in a systems development project should culminate in one or more ________. A) deliverables B) zones C) segments D) designs Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 22) A(n) ________ is a hierarchy of the tasks required to complete a project. A) scatter plot B) work breakdown structure C) encryption algorithm D) virtual model Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 23) A ________ defines the boundaries of a system in a work breakdown structure (WBS). A) trade-off B) code C) scope D) scale Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
24) Which of the following tools shows the tasks, dates, and dependencies in a project? A) Gantt chart B) exception report C) push report D) DPlot Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 25) A(n) ________ is the sequence of activities that determine the earliest date by which a project can be completed. A) Gantt chart B) critical path C) encryption algorithm D) scatter plot Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 26) Prototypes are examples of deliverables in a systems development project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 27) The critical path is a hierarchy of the tasks required to complete a project. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
28) In case of task dependencies in a project, all tasks must begin and end at the same time. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 29) Baseline work breakdown structures can be used for monitoring a project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept 30) What is a critical path? How is a critical path analysis done? Answer: A critical path is a sequence of activities that determine the earliest date by which a project can be completed. The earliest date is the date determined by considering the longest path through the network of activities. Paying attention to task dependencies, a planner can compress tasks as much as possible. Those tasks that cannot be further compressed lie on the critical path. Microsoft Project and other project-planning applications can readily identify critical path tasks. Managers can use the critical path to perform critical path analysis. If a task is on the critical path, and if that task runs late, the project will be late. Hence, tasks on the critical path cannot be allowed to run late if the project is to be delivered on time. Additionally, tasks not on the critical path can run late to the point at which they would become part of the critical path. Hence, up to a point, resources can be taken from noncritical path tasks to shorten tasks on the critical path. Using critical path analysis, managers can move resources among tasks so as to compress the schedule. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.4: How does a work breakdown structure drive project management? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
31) Which of the following activities is the biggest challenge in planning systems development? A) creating B) scheduling C) analyzing D) testing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project? Classification: Concept 32) Scheduling a large-scale project is more difficult than scheduling individual projects. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project? Classification: Concept 33) One approach businesses take to address scheduling challenges in large-scale systems is avoiding the development of software in-house. Answer: TRUE AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project? Classification: Concept 34) A function point is a feature or function of a new program. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
35) The biggest challenge in planning large-scale systems development is scheduling. Describe the three approaches that organizations can take to address this challenge. Answer: The first approach that organizations can take to address the challenge of scheduling large-scale systems development projects is to avoid all major schedule risks by never developing software in-house. Instead, they can license software from vendors. However, if no suitable software exists, companies can take one of two remaining approaches. They can admit the impossibility of systems development scheduling and plan accordingly. They can abandon the systems development life cycle and decide to invest a certain level of resources into a project, manage it as best as they can, and take the schedule that produces results. The third approach is to attempt to schedule the development project in spite of all difficulties. Several different estimation techniques can be used. If the project is similar to a past project, the schedule data from that past project can be used for planning. When such similar past projects exist, this technique can produce quality schedule estimates. If there is no such past project, managers can estimate the number of lines of code that will need to be written. Then they can use industry or company averages to estimate the time required. Another technique is to estimate the function points in a program, use each function point to determine the number of lines of code, and use that number to estimate schedules. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.5: What is the biggest challenge for planning a systems development project? Classification: Concept 36) The challenges of managing large-scale systems development projects arise from ________. A) economies of scale B) economies of scope C) increase in configuration control D) lack of coordination Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
37) ________ refers to a set of management policies, practices, and tools that developers use to maintain control over a project's resources. A) Perceptual mapping B) Coordination control C) Critical path analysis D) Configuration control Answer: D AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept 38) A well-managed project will never face problems of diseconomies of scale. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept 39) A loss of control over a project's configuration is usually negligible and not so expensive to fix. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept 40) The smaller and shorter a project, the greater the chance of disruption due to unanticipated events. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept 13 Copyright © 2016 Pearson Education, Inc.
41) What are the biggest challenges for managing a large-scale systems development project? Answer: The challenges of managing large-scale systems development projects arise from four different factors: coordination, diseconomies of scale, configuration control, and unexpected events. Large-scale projects are usually organized into a variety of development groups that work independently. Coordinating the work of these independent groups can be difficult, particularly if they reside in different geographic locations or different countries. An accurate and complete work breakdown structure (WBS) facilitates coordination, but no project ever proceeds exactly in accordance with the WBS. The coordination problem is increased because software is purethought stuff. Another problem is diseconomies of scale. Adding more people to a project increases coordination requirements. The number of possible interactions among team members rises exponentially with the number of team members. Ultimately, no matter how well managed a project is, diseconomies of scale will set in. Also, as the project proceeds, controlling the configuration of the work product becomes difficult. Problems can occur with designs, program code, database data, and other system components. Configuration control is vital here. The last major challenge to large-scale project management is unexpected events. The larger and longer a project lasts, the greater the chance of disruption due to an unanticipated event. AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.6: What are the biggest challenges for managing a systems development project? Classification: Concept 42) ________ is the process by which users agree to one set of conditions, then add a bit more, then add a bit more, and so forth. A) Requirements creep B) Diseconomies of scale C) Configuration control D) Coordination Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.7: What is the single most important task for users on a systems development project? Classification: Concept
14 Copyright © 2016 Pearson Education, Inc.
43) Taking responsibility for requirements is the single most important task a user can perform for a large-scale development project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.7: What is the single most important task for users on a systems development project? Classification: Concept 44) Requirements creep is the process by which a project manager reduces his or her responsibilities for requirements through miniscule rollbacks. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 28.7: What is the single most important task for users on a systems development project? Classification: Concept
15 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 17 Agile Development 1) According to the systems development life cycle (SDLC), the progress from requirements to design to implementation is called the ________ method. A) life cycle B) waterfall C) water cycle D) scrum Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 2) Why is the systems development life cycle (SDLC) called the waterfall method? A) It does not return to a development phase that has been completed. B) It uses feedback from team members to schedule tasks. C) It delivers a working version of the product at frequent intervals. D) It can be used only for projects on information systems. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 3) The systems development life cycle (SDLC) gained popularity because it was stipulated that it would be used for all software development contracts by the U.S. Department of ________. A) Defense B) Education C) Agriculture D) Commerce Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) Which of the following statements indicates why the SDLC is falling out of favor? A) The system design is revised frequently. B) It allows the team members to establish the project schedule. C) It is risky, as no value is generated until the end of the project. D) Systems requirements do not change during a project. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 5) The nature of the systems development life cycle (SDLC) denies the fact that system requirements are fuzzy and always changing. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 6) According to the systems development life cycle (SDLC), the progress from requirements to implementation is nonlinear. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 7) The systems development life cycle (SDLC) gained popularity when the U.S. Department of Commerce stipulated that it would be used for all software development contracts. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 8) In software development, where requirements change periodically, the waterfall model works well. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 2 Copyright © 2016 Pearson Education, Inc.
9) The waterfall model used by the systems development life cycle (SDLC) is suitable for building physical things, such as a runway. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 10) The systems development life cycle (SDLC) is falling out of favor because it is very risky. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept 11) Why is the systems development life cycle (SDLC) losing credibility? Answer: The systems development life cycle (SDLC) process is falling out of favor in the systems development community, primarily for two reasons. First, the nature of the SDLC denies what every experienced developer knows is true: systems requirements are fuzzy and always changing. They change because they need to be corrected, or more is known, or users, once they see a part of the application, change their minds. Other reasons are that business needs change, or technology offers other possibilities. According to the SDLC, however, progress goes in a linear sequence from requirements to design to implementation. Sometimes this is called the waterfall method because the assumption is that once a phase is finished, it is not revisited. Requirements are done. Then design is taken up. Design is completed, and is followed by implementation. However, experience has shown that it just doesn't work that way. Another reason that the SDLC is falling out of favor is that it is very risky. The people for whom the system is being constructed cannot see what they have until the end. At that point, if something is wrong, all the money and time has already been spent. Furthermore, what if the project runs out of money or time before it is completed? The result is a form of management blackmail in which the developers ask for more money or time. If management declines, which it might because the time or money at that point is sunk, they are left not only with the loss but also with the unmet need that caused them to start the process in the first place. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.1: Why is the SDLC losing credibility? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
12) The systems development life cycle (SDLC) generates values ________. A) in the beginning B) after the design phase C) at frequent intervals D) at the very end Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 13) Designing only the portions of the system that are needed to complete the current work being done is known as ________ design. A) waterfall B) scrum C) just-in-time D) frequent Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 14) Which of the following is an advantage of using agile techniques over the SDLC? A) In projects using agile techniques, customers test only the completed version of the product. B) Changes in systems requirements are incorporated toward the end of the project. C) System design is completed at the beginning of the project. D) A working version of the product is delivered frequently during the project. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 15) "Test as you go" is a principle of the SDLC. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
16) Extreme programming is one of the alternatives to the systems development life cycle (SDLC). Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 17) Agile development methodologies welcome changes in requirements. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 18) The systems development life cycle (SDLC) processes are designed to frequently deliver a working version of a product. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 19) Unlike agile techniques, the systems development life cycle (SDLC) delivers benefits early and often. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 20) Agile development methodologies advocate the design of the complete system at the beginning. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
21) Agile development methodologies discourage interaction between developers and customers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 22) Just-in-time design may lead to substantial revision of the work product produced previously in the project. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 23) According to agile development methodologies, testing never involves business customers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 24) Agile development techniques assume that the development teams are unaware of their weaknesses. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 25) Agile development methodologies are applicable only to team projects on information systems. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
26) What are the principles of agile development methodologies? Answer: The following are the principles of agile development: ®
go • Team knows best how it's doing/how to change • Can be used for applications, information systems, and business process development AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.2: What are the principles of agile development methodologies? Classification: Concept 27) Which of the following development methodologies is associated with the scrum process? A) agile development B) systems development life cycle C) V-Model D) rapid application development Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 28) According to scrum essentials, the first step of each work period is to ________. A) conduct team meets B) determine tasks to perform C) select requirements to consider D) deliver a working version Answer: C AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
29) In ________, two members share the same computer and write a computer program together. A) imperative programming B) paired programming C) task parallelism D) parallel computing Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 30) The ________ is the only person on a scrum team who has the authority to add, delete, or change requirements and their priority. A) scrum master B) product owner C) database designer D) business analyst Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 31) The function of a scrum master is to ________. A) stop the misuse of meeting time B) change product requirements and their priority C) test programs on a regular basis D) develop the database design Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 32) Scrum essentials encourage minimal documentation. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
33) In the scrum process, a stand-up is a 15-minute team meeting. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 34) In paired programming, two computers are used by the same programmer. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 35) Briefly outline the scrum essentials. Answer: The following are the scrum essentials: • Requirements list drives process • Each work period (1 to 4−8 weeks): Select requirements to consider Determine tasks to perform–select requirements to deliver Team meets daily for 15 min (stand-up) ∘ What I did yesterday ∘ What I'm going to do today ∘ What's blocking me Test frequently Paired work possible Minimal documentation Deliver (something) that works Evaluate team's work process at end of period (and say thanks) • Rinse and repeat until: Customer says we're done Out of time Out of money • Three principal roles: Product Owner (business professional) Scrum Master Team Members (7 ± 2 people) AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
36) According to the scrum essentials, when is a project said to be done? Answer: Work continues in a repeating cycle of scrum periods until one of three conditions is met: • The customer is satisfied with the product created and decides to accept the work product, even if some requirements are left unsatisfied. • The project runs out of time. • The project runs out of money. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 37) In a scrum, who is a product owner? Answer: The product owner is the business professional who provides the requirements and is available for clarification and testing. The product owner is the only person on a scrum team who has the authority to add, delete, or change requirements and their priority. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 38) In a scrum, who is a scrum master? What are his or her responsibilities? Answer: A scrum master is an expert in scrum processes who helps to keep the process organized and operating. The scrum master is not the boss; he or she is more like a coach or even a referee. The scrum master steps in when meetings go too long, when team members are misusing meeting time, when the product sponsor isn't doing his or her job, and when other situations are not working. The scrum master is also the guardian of team members' time. If distractions occur, the scrum master steps in to eliminate them. If someone other than the product sponsor attempts to change requirements or priorities, the scrum master negates that attempt. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
39) Who are considered scrum team members? Answer: Team members are the programmers, systems analysts, business analysts, database designers, cloud engineers, PQA testing personnel, and any other staff needed to build the work product. Scrum teams are small; five to nine team members are recommended. If work requires more personnel, then the work is reorganized to be accomplished by multiple scrum teams working in parallel. It's not clear that scrum works well for exceedingly large projects, but then again, it's not clear that any other development process works well for them, either. AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.3: What is the scrum process? Classification: Concept 40) Which of the following statements is true about the points system? A) Points are assigned by the clients at the beginning of the project. B) The most difficult task is assigned a point score of 1. C) Consecutive integers are used to award point scores to tasks. D) Points estimate the relative difficulty, rather than the relative duration of tasks. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.4: How do requirements drive the scrum process? Classification: Concept 41) As teams work together, they will learn the total number of points of work they can accomplish each scrum period. That term is called the team's ________. A) velocity B) capacity C) momentum D) vector Answer: A AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.4: How do requirements drive the scrum process? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
42) Which of the following statements is true about velocity? A) The customer sets the velocity of each scrum period. B) When a project begins, the senior team members guess the velocity of the team. C) After a scrum team commits to requirements in a scrum period, it estimates the velocity it can achieve. D) A team approaches the scrum master to change the order of the requirements to which it has committed. Answer: B AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.4: How do requirements drive the scrum process? Classification: Concept 43) Which of the following is a characteristic that makes agile development a valid systems development process? A) Team iteration and feedback are used for scheduling and tasking. B) Process scheduling is performed by the scrum master. C) Through iteration, team members decide when a project is complete. D) Once a phase of development is completed, it is not revisited. Answer: A AACSB: Information Technology Difficulty: Moderate Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.4: How do requirements drive the scrum process? Classification: Concept 44) Scrum is distinguished from other agile development methodologies, in part, by the way that it uses requirements to drive planning and scheduling. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss the key issues involved in managing the components of IT infrastructure. Learning Obj: LO 29.4: How do requirements drive the scrum process? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.
Experiencing MIS, 6e (Kroenke) Chapter Extension 18 Business Process Management 1) A(n) ________ is a network of activities, actors, roles, repositories, and data and sequence flows that interact to accomplish a business function. A) business enterprise B) business process C) inventory network D) communication system Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 2) Which of the following is the first step in processing an order? A) checking customer credit B) approving special terms C) verifying availability D) preparing a quotation Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 3) A customer's credit is checked before checking the availability of goods in order to ________. A) increase the rate of credit approval of customers B) arrange for the special terms requested C) prevent the wastage of shipping-verification labor D) align the processes with organizational goals Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept
1 Copyright © 2016 Pearson Education, Inc.
4) A company stops stocking an item but procures it directly from the manufacturer. This implies that the company has made a change in its ________. A) product line B) supply chain C) credit policy D) distribution structure Answer: B AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 5) Which of the following steps is the most appropriate if a company decides to accept more risk and sell to companies with lower credit scores? A) modifying the credit checking process B) implementing different ways of checking credit C) approving special terms before checking the credit D) shipping the inventory directly from the manufacturer to lower the credit Answer: C AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 6) In which of the following situations will credit checking be made the first step in the procedure of processing an order? A) during recession B) during a merger C) during an acquisition D) during inflation Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept
2 Copyright © 2016 Pearson Education, Inc.
7) Repositories are most often collections of data. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 8) While processing a purchase order, if a customer's request for special terms is disapproved, the cost of checking availability and credit is wasted. Answer: TRUE AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 9) A substantial change in the business environment, like the onset of recession, might mean that checking credit becomes unnecessary. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 10) The credit-check process is independent of the inclusion or exclusion of new categories of customers. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept
3 Copyright © 2016 Pearson Education, Inc.
11) Give an example to illustrate how business processes fail to work when misaligned with an organization's goals. Answer: Business processes do not work well when they are misaligned with an organization's goals, objectives, or competitive strategy. The most obvious reason for changing a process is that it has efficiency or effectiveness problems. Consider a sales process. If the organization's goal is to provide high-quality service, then if the process takes too long or if it rejects credit inappropriately, it is ineffective and needs to be changed. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 12) How can a change in customers, product lines, and supply chains affect business processes? Answer: A new category of customers could mean that the credit-check process needs to be modified; a certain category of customers is too risky to be extended credit. All sales to customers in this category must be for cash. A change in product lines might require different ways of checking availability. A change in the supply chain might mean that a company no longer stocks some items in inventory, but ships directly from the manufacturer instead. AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.1: Why do organizations need to manage business processes? Classification: Concept 13) A business will be in crisis continually, dealing with one process emergency after another, when it ________. A) plans to develop the business process B) actively seeks to change business processes C) waits and lets the need for change just happen to it D) plans to update its business process Answer: C AACSB: Analytical Thinking Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept
4 Copyright © 2016 Pearson Education, Inc.
14) Which of the following is the first step in a business process management (BPM) cycle? A) defining business process requirements B) creating models of business processes C) implementing the needed business processes D) assessing business process effectiveness Answer: B AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept 15) In which of the following types of business process management (BPM) scopes does problem resolution via committee and policy occur? A) functional B) departmental C) inter-enterprise D) enterprise Answer: D AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept 16) Which of the following is an example of an inter-enterprise scope? A) supply chain management B) enterprise resource management C) accounts management D) customer relationship management Answer: A AACSB: Analytical Thinking Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept
5 Copyright © 2016 Pearson Education, Inc.
17) When organizations plan to develop and modify business processes, their businesses will continually be in crisis, dealing with one process emergency after another. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept 18) Business process management (BPM) cannot be applied to nonprofit organizations. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept 19) Describe business process management (BPM) in brief. Answer: Business process management (BPM) is a cyclical (recurring) process for systematically creating, assessing, and altering business processes. This cycle begins by creating models of business processes. The business users who have expertise and are involved in a particular process adjust and evaluate those models. Usually, teams build an as-is model that documents the current situation. Depending on the nature of a problem, new process models are then created. The next step is to create process components. Next, the new or changed business processes are implemented. Well-managed organizations don't stop there. Instead, they create policies, procedures, and committees to continually assess business process effectiveness. When a need for change arises, a company models a new, adjusted business process, and the cycle is repeated. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.2: What are the stages of business process management (BPM)? Classification: Concept
6 Copyright © 2016 Pearson Education, Inc.
20) Which of the following statements is true about the relationship between business processes and information systems (IS)? A) A business process and an information system (IS) have the same purpose. B) An information system (IS) in an organization is used by only one business process. C) Every activity in a business process is a component of an information system (IS). D) Information system (IS) elements are embedded within a business process. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 21) The components and purpose of a business process and an information system are the same. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 22) Business processes and information systems overlap. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 23) A procedure is a component of an information system and is embedded within a process activity. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept
7 Copyright © 2016 Pearson Education, Inc.
24) A business process need not use just one information system. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 25) A particular information system cannot be used by multiple single business processes simultaneously. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 26) Every activity of a business process involves an information system. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 27) The relation between business processes and information systems is many-to-many. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept
8 Copyright © 2016 Pearson Education, Inc.
28) What are the three principles that relate business processes and information systems? Answer: According to the first principle, information system elements are embedded within business processes, but some activities in business processes are not part of any information system. Business processes and information systems overlap, but they are different. Second, a business process can use zero, one, or more information systems. According to the third principle, a particular information system may be used by one or more business processes. AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.3: How do business processes and information systems relate? Classification: Concept 29) Which of the following statements is true about choosing whether to develop information systems (IS) or business processes first? A) For a business process that is being constructed, building an information system (IS) after creating the business process is likely to cause problems. B) If an information system is built after the creation of business processes, other business processes that use the same information system (IS) can be integrated easily. C) If business processes are built after the information system (IS) development process, activities that are not part of the IS may not be considered. D) If an information system (IS) is built first, the development team should determine the requirements by itself. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept 30) Creating computer programs and designing databases in-house is more affordable than buying off-the-shelf software. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept
9 Copyright © 2016 Pearson Education, Inc.
31) Both information systems and business processes can be purchased off-the-shelf. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept 32) An advantage of an enterprise resource planning (ERP) system is that to implement it, an organization need not attempt to do everything at once. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept 33) An application that works for the business processes developed initially is likely to include functions that will cater to business processes designed in the future. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept 34) Enterprise resource planning (ERP) vendors do not include business processes as a part of the software package. Answer: FALSE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept
10 Copyright © 2016 Pearson Education, Inc.
35) An application that includes business processes as part of the package requires time for integration and training. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.4: Which comes first, business processes or information systems? Classification: Concept 36) Which of the following statements is true about process problems? A) The task of solving a process problem is ideally given to systems analysts. B) An as-is diagram for business processes exists in all organizations. C) Business analysts prefer to use process schematics instead of Business Process Modeling Notation. D) When a business process has simply evolved, it is possible that no one knows the entire process. Answer: D AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.5: How is business process management (BPM) practiced in the real world? Classification: Concept 37) Which of the following statements is true about designing, creating, and implementing a new business process? A) Process changes that don't work can be undone easily. B) Computer simulation of alternative processes is inexpensive. C) Technology may change during the development process. D) Resolution of implementation problems is easier for enterprise processes. Answer: C AACSB: Information Technology Difficulty: Moderate Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.5: How is business process management (BPM) practiced in the real world? Classification: Concept
11 Copyright © 2016 Pearson Education, Inc.
38) The difficulty of creating an as-is process diagram depends on the sophistication of the organization. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.5: How is business process management (BPM) practiced in the real world? Classification: Concept 39) If employees are already using an information system (IS), one way of adjusting role resources is to improve the information system so as to facilitate a new process. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.5: How is business process management (BPM) practiced in the real world? Classification: Concept 40) The resolution of implementation problems can be difficult for enterprise and inter-enterprise processes because there is no recognized authority to enforce solutions. Answer: TRUE AACSB: Information Technology Difficulty: Easy Course LO: Discuss best practices for selecting, evaluating, and managing information systems projects. Learning Obj: LO 30.5: How is business process management (BPM) practiced in the real world? Classification: Concept
12 Copyright © 2016 Pearson Education, Inc.