Experiencing MIS 4e David Kroenke (Test Bank All Chapters, 100% Original Verified, A+ Grade) Experiencing MIS, 4e (Kroenke) Chapter 1: The Importance of MIS Multiple Choice 1) "The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law. A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's Answer: B Page Ref: 5 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) Which of the following statements best describes Moore's Law? A) A computer becomes obsolete within 18 months. B) The number of transistors per square inch on an integrated chip doubles every 18 months. C) The total number of transistors produced in the world doubles every 18 months. D) The speed of a computer doubles every 18 months. Answer: B Page Ref: 5 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) As a result of Moore's Law, ________. A) the risk of technology becoming obsolete has decreased B) the price to performance ratio of computers has fallen dramatically C) software prices have come down dramatically D) smaller chip manufacturers are able to reduce investments in research and development Answer: B Page Ref: 5 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
1 Copyright © 2014 Pearson Education, Inc.
4) Because of Moore's Law, the cost of data communications and data storage ________. A) is essentially zero B) has increased exponentially C) is witnessing an upward trend D) has leveled off Answer: A Page Ref: 5 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5) Because the cost of data storage and data communications is essentially zero, any routine skill will be ________. A) performed in-house by skilled professionals B) outsourced to a vendor who is geographically closer C) outsourced to the lowest bidder D) performed in-house by semi-skilled professionals Answer: C Page Ref: 6 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 6) In today's world, skills such as tax accounting and computer programming no longer guarantee job security. What is the reason for this? A) They are routine skills which can and will be outsourced to the lowest bidder. B) They are nonroutine skills which are no longer required in these technologically advanced times. C) They are nonroutine skills which can be performed by only certain groups of employees. D) They are routine skills which are not needed in most modern organizations. Answer: A Page Ref: 6 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Discuss the ethical and social issues raised by the use of information systems
2 Copyright © 2014 Pearson Education, Inc.
7) Peter is an engineer working in the United States. In accordance with Moore's Law, which of the following is a nonroutine cognitive skill that would provide him with job security? A) programming skills B) systems thinking C) tax accounting D) data entry skills Answer: B Page Ref: 6 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Discuss the ethical and social issues raised by the use of information systems 8) ________ is the ability to make and manipulate models. A) Abstract reasoning B) Systems thinking C) Social learning D) Experimentation Answer: A Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 9) Modeling system components and showing how components' inputs and outputs relate to one another is attributable to ________. A) abstract reasoning B) systems thinking C) conceptualization D) experimentation Answer: B Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
3 Copyright © 2014 Pearson Education, Inc.
10) ________ is the ability to model the components of a unit, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. A) Systems thinking B) Abstract reasoning C) Cognitive reasoning D) Experimentation Answer: A Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 11) ________ is the activity of two or more people working together to achieve a common goal, result, or work product. A) Venturing B) Enterprising C) Collaboration D) Assimilation Answer: C Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 12) In a job interview, you are asked to make a group presentation with four other interviewees. You are required to form a team and then compete with other groups to win the presentation contest. Which of the following skills is your interviewer trying to test? A) collaboration B) abstract reasoning C) systems thinking D) ability to experiment Answer: A Page Ref: 7 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
4 Copyright © 2014 Pearson Education, Inc.
13) Patricia is the marketing manager at a manufacturing firm. She develops ideas and plans with her subordinates and provides and receives critical feedback. Here, Patricia is displaying effective ________. A) collaboration B) experimentation C) systems thinking D) abstraction Answer: A Page Ref: 7-8 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 14) Creating and testing promising new alternatives, consistent with available resources, is an example of ________. A) experimentation B) abstraction C) systems thinking D) collaboration Answer: A Page Ref: 8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 15) Which of the following is necessary for effective collaboration? A) the ability to handle stress B) the ability to manipulate models C) the ability to conduct thorough research on a given problem D) the ability to give and receive critical feedback Answer: D Page Ref: 8 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 16) Which of the following marketable skills is the most useful in overcoming the fear of failure? A) ability to experiment B) systems thinking C) abstract reasoning D) collaboration Answer: A Page Ref: 8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5 Copyright © 2014 Pearson Education, Inc.
17) ________ involves making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has. A) Abstraction B) Experimentation C) Systems thinking D) Random sampling Answer: B Page Ref: 8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 18) In a job interview, you are asked to use a product that you have never used before and are not familiar with. Which of the following skills is your interviewer trying to test? A) systems thinking B) abstract reasoning C) collaboration D) ability to experiment Answer: D Page Ref: 8 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 19) A group of components that interact to achieve some purpose is referred to as a(n) ________. A) system B) element C) process D) entity Answer: A Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
6 Copyright © 2014 Pearson Education, Inc.
20) Which of the following is an example of the hardware component of an information system? A) web browser B) operating system C) microprocessor D) data file Answer: C Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 21) The five-component framework of an information system consists of computer hardware, software, data, people, and ________. A) bugs B) procedures C) device drivers D) tools Answer: B Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 22) In a grocery store, the clerk scans the UPC code on an item, which is transmitted to the computer. The actual scanner device is an example of the ________ component of an IS. A) hardware B) software C) data D) procedure Answer: A Page Ref: 10 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
7 Copyright © 2014 Pearson Education, Inc.
23) The last part of the definition of MIS is that information systems exist to help businesses achieve their ________. A) market share B) strategies C) sales target D) outputs Answer: B Page Ref: 12 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 24) Which of the following is a valid reason for a company to create a new information system? A) The company needs to project a modern image. B) The company does not want to fall behind the technology curve. C) The dynamic nature of the company has led to new requirements. D) Most companies in the industry use information systems. Answer: C Page Ref: 12 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 25) Which of the following is the most complete and accurate definition of information technology? A) the products, methods, inventions, and standards that are used to produce information B) an assembly of hardware, software, data, procedures, and people that produces information C) systems that are used to process the information that is produced using technology D) the various data models and software that are used to interpret available information Answer: A Page Ref: 13 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
8 Copyright © 2014 Pearson Education, Inc.
26) Which of the following distinguishes information systems from information technology? A) people B) data C) software D) hardware Answer: A Page Ref: 13 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 27) Which of the following is the most crucial requirement for the success of a security system? A) Users should take security seriously. B) Firewalls should be installed and updated regularly. C) Administrative authority should be distributed among team members. D) Anti-virus software should be installed. Answer: A Page Ref: 14 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 28) Which of the following is an essential characteristic of a strong password? A) It should have at least 12 characters. B) It should contain a complete dictionary word. C) It should not contain many special characters. D) It should not contain your user name or company name. Answer: D Page Ref: 14 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 29) You have created a password which meets all the criteria for a strong password. What is a potential drawback of such a password? A) It will be difficult to remember. B) It will be very long. C) It can be easily guessed. D) It will create IP address conflicts in networks. Answer: A Page Ref: 14 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 9 Copyright © 2014 Pearson Education, Inc.
30) Which of the following, if true, would weaken a password? A) It contains a complete dictionary word in Latin. B) It contains both upper- and lowercase letters. C) It contains the numbers 9 and 3. D) It contains three special characters. Answer: A Page Ref: 14 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 31) Which of the following is the weakest password? A) B33rmu9 B) Qw37^T1bb?as C) 3B47qq<3>5!7bdE D) As60$T1dd?dc Answer: A Page Ref: 14 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 32) Which of the following is considered a strong password? A) sword123 B) RileyyeliR C) paranoid4EVER D) BL@k2V1.0.1 Answer: D Page Ref: 14 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
10 Copyright © 2014 Pearson Education, Inc.
33) Which of the following techniques is best suited for creating memorable, strong passwords? A) use at least one dictionary word in the password B) use numbers instead of special characters C) base passwords on the first letter of the words in a phrase D) create a password that is related to your name or company name Answer: C Page Ref: 14-15 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 34) In order to protect your password, you should never ________. A) use the password more than three times in a day B) write down your password C) use virtual keyboards to enter your password D) create passwords containing multiple special characters Answer: B Page Ref: 15 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 35) Which of the following statements on password etiquette is true? A) If someone asks for your password, do not just give it out. B) Always back-up your password by writing it down. C) Never access an information system from a computer that is connected to the Internet. D) Never use the password more than three times a day. Answer: A Page Ref: 15 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
11 Copyright © 2014 Pearson Education, Inc.
36) If someone asks for your password, ________. A) adamantly refuse to provide the password B) go over to that person's machine and enter your password yourself C) ensure that they have a good reason to need access to your account and give them the password D) provide the password through an e-mail Answer: B Page Ref: 15 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security True or False 1) Moore's Law states that the number of transistors and integrated chips used in a computer doubles in every 18 months. Answer: FALSE Page Ref: 5 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) As a result of Moore's Law, the price/performance ratio of computers has increased dramatically over the years. Answer: FALSE Page Ref: 5 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 3) Because of Moore's Law, the cost of data storage has increased. Answer: FALSE Page Ref: 5 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
12 Copyright © 2014 Pearson Education, Inc.
4) The phenomenal growth of video sharing websites such as YouTube is an example of how Moore's Law can impact the business environment. Answer: TRUE Page Ref: 5 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) Tax accounting is an example of a marketable skill. Answer: FALSE Page Ref: 6 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 6) Because of Moore's Law, the cost of data communications is essentially zero. Answer: TRUE Page Ref: 6 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 7) Because of Moore's Law, any routine skill can be outsourced. Answer: TRUE Page Ref: 6 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 8) Modeling a unit's components and showing how components' inputs and outputs relate to one another is an example of systems thinking. Answer: TRUE Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 9) Abstract reasoning is the ability to make and manipulate models. Answer: TRUE Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 13 Copyright © 2014 Pearson Education, Inc.
10) Critical feedback undermines collaboration. Answer: FALSE Page Ref: 8 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 11) Effective collaboration is all about being nice to your team members. Answer: FALSE Page Ref: 8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 12) Statements such as, "I've never done this before" and "Is it too weird for the market?" show a lack of ability to experiment. Answer: TRUE Page Ref: 8 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 13) Experimentation only increases the fear of failure. Answer: FALSE Page Ref: 8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 14) If you are provided with an unfamiliar program and are asked to use it, you are being tested on your ability to effectively collaborate. Answer: FALSE Page Ref: 8 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 15) An information system is a group of components that interact to produce information. Answer: TRUE Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 14 Copyright © 2014 Pearson Education, Inc.
16) When you use a computer to write a class report, the methods you use to start the program, enter your report, print it, and save and back up your file are referred to as procedures. Answer: TRUE Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 17) A student's schedule in a portable calendar is an example of an information system. Answer: TRUE Page Ref: 10 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 18) MIS is concerned with the use of information systems that help businesses achieve their goals and objectives and not the development of such systems. Answer: FALSE Page Ref: 10 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 19) Information systems should be created if the company is falling behind the technology curve. Answer: FALSE Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 20) Business professionals should look at information systems and technologies only through the lens of business need. Answer: TRUE Page Ref: 12 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes
15 Copyright © 2014 Pearson Education, Inc.
21) The last part of the definition of MIS is that information systems exist to help businesses achieve their strategies. Answer: TRUE Page Ref: 12 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 22) Information systems can be bought whereas information technology cannot. Answer: FALSE Page Ref: 13 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 23) Strong passwords have five or more characters. Answer: FALSE Page Ref: 14 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 24) Good passwords contain a complete dictionary word. Answer: FALSE Page Ref: 14 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 25) If your password is complex, it is ideal to write the password on a piece of paper and keep it near your workstation Answer: FALSE Page Ref: 14 Difficulty: Easy AACSB: Ethical Understanding and Reasoning Abilities Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
16 Copyright © 2014 Pearson Education, Inc.
26) The "do-si-do" move refers to the password etiquette one must follow when requesting someone else's password. Answer: TRUE Page Ref: 15 Difficulty: Easy AACSB: Ethical Understanding and Reasoning Abilities Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 27) If someone asks you for your password, do not share it with them. Answer: TRUE Page Ref: 15 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security Essay 1) Define Moore's Law and explain how the phenomenon it describes affects the technology business. Answer: Moore's Law states that the number of transistors per square inch on an integrated chip doubles every eighteen months. The more common version of this is expressed as "The speed of a computer chip doubles every eighteen months" which is incorrect. Due to the impact of Moore's Law, the price/performance ratio of computers has fallen dramatically over the past decade, and computers have shrunk dramatically in both size and cost while computing power has increased drastically. Moore's Law is the principal reason why data storage and data transmission are essentially free today. New businesses like YouTube and Facebook have taken advantage of the opportunities offered by this development. Page Ref: 5 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 2) What is a marketable skill? Answer: It used to be that one could name particular skills, such as computer programming, tax accounting, or marketing as examples of marketable skills. But today, because of Moore's Law, because the cost of data storage and data communications is essentially zero, any routine skill can and will be outsourced to the lowest bidder. One has to develop strong non-routine cognitive skills to be more successful and such skills are called marketable skills. Abstract reasoning, systems thinking, collaboration, and ability to experiment are marketable skills. Page Ref: 6-7 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 17 Copyright © 2014 Pearson Education, Inc.
3) What is abstract reasoning? Provide an example. Answer: Abstract reasoning is the ability to make and manipulate models. Constructing a model of the five components of an information system is an example of abstract reasoning. Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 4) What is meant by systems thinking? Answer: Systems thinking is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. Page Ref: 7 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 5) What is collaboration? How can one ensure effective collaboration? Answer: Collaboration is the activity of two or more people working together to achieve a common goal, result, or work product. Effective collaboration isn't about being nice. In fact, surveys indicate the single most important skill for effective collaboration is to give and receive critical feedback. Page Ref: 7-8 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 6) What is experimentation? Explain its importance. Answer: Successful experimentation is not throwing buckets of money at every idea that enters your head. Instead, experimentation is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources you have. Fear of failure paralyzes many good people and many good ideas. This can be overcome by having the ability to experiment. Page Ref: 8 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
18 Copyright © 2014 Pearson Education, Inc.
7) Describe an information system. Answer: A system is a group of components that interact to achieve some purpose. An information system (IS) is a group of components that interact to produce information. An IS is based on the five-component framework of computer hardware, software, data, procedures, and people. These five components are present in every information system—from the most simple to the most complex. Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 8) Describe the five components of an information system using an example. Answer: The five components of an information system are computer hardware, software, data, procedures, and people. When you use a computer to write a class report, you are using hardware (the computer, storage disk, keyboard, and monitor), software (Word, WordPerfect, or some other word-processing program), data (the words, sentences, and paragraphs in your report), procedures (the methods you use to start the program, enter your report, print it, and save and back up your file), and people (you). Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 9) Do you think a computer is an essential component of an information system? Why or why not? Answer: Many information systems include computers. However, there are information systems that do not include computers. A calendar hanging on the wall outside of a conference room that is used to schedule the room's use is also an information system. Page Ref: 10 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 10) Define management information systems. What are the key elements of its definition? Answer: Management information systems refer to the development and use of information systems that help businesses achieve their goals and objectives. This definition has three key elements: development and use, information systems, and business goals and objectives. Page Ref: 10 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 19 Copyright © 2014 Pearson Education, Inc.
11) Other than development tasks, what are the other roles than you will need to undertake in the use of information systems? Answer: In addition to development tasks, you will also have important roles to play in the use of information systems. You will need to learn how to employ the system to accomplish your goals. You will also have important ancillary functions as well. For example, when using an information system, you will have responsibilities for protecting the security of the system and its data. You may also have tasks for backing up data. When the system fails, you will have tasks to perform while the system is down as well as tasks to accomplish to help recover the system correctly and quickly. Page Ref: 10 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) Explain the management and use of information systems. Answer: We define management to mean develop, maintain, and adapt. Information systems do not pop up like mushrooms after a hard rain; they must be developed. They must also be maintained and, because business is dynamic, they must be adapted to new requirements. To create an information system that meets your needs, you need to take an active role in that system's development. In addition to management tasks, you will also have important roles to play in the use of information systems. For example, when using an information system, you will have responsibilities for protecting the security of the system and its data. You may also have tasks for backing up data. Page Ref: 12 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 13) What are the points one needs to keep in mind when deciding to implement a management information system (MIS)? Answer: When deciding to implement an MIS, one needs to keep in mind that information systems are not created for the sheer joy of exploring technology. They are not created so that the company can be "modern" or so that the company can show it has a social networking presence on the Web. They are not created because the IS department thinks it needs to be created or because the company is "falling behind the technology curve." An MIS exists to help businesses achieve their goals and objectives. As a future business professional, you need to learn to look at information systems and technologies only through the lens of business need. Page Ref: 12-13 Difficulty: Moderate Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
20 Copyright © 2014 Pearson Education, Inc.
14) Explain the difference and the relationship between information technology (IT) and information systems (IS). Answer: Information technology and information system are two closely related terms, but they are different. IT refers to methods, inventions, standards, and products. IT refers to raw technology, and it concerns only the hardware, software, and data components of an information system. In contrast, an information system is a system of hardware, software, data, procedures, and people that produce information. IT, by itself, will not help an organization achieve its goals and objectives. It is only when IT is embedded into an IS—only when the technology within the hardware, software, and data is combined with the people and procedure components—that IT becomes useful. Page Ref: 13 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 15) What is the role of users in information security? Answer: Like all information systems, security systems have the five components, including people. Thus, every security system ultimately depends on the behavior of its users. If the users do not take security seriously, if they do not follow security procedures, then the hardware, software, and data components of the security system are wasted expense. Page Ref: 14 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 16) Explain how you would create a strong password. Answer: Strong passwords should have seven or more characters in them, consisting of upper and lower case letters, numbers, and special characters. They should not contain any complete dictionary word in any language, nor should they contain your user name, real name, or company name. They should also be different from any other password that you have previously used. An example of a strong password is Qw37^T1bb?at. Page Ref: 14 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
21 Copyright © 2014 Pearson Education, Inc.
17) Explain the necessary password etiquette to be followed by users of an information system. Answer: Once you have created a strong password, you need to protect it with proper behavior. Proper password etiquette is one of the marks of a business professional. Never write down your password, and do not share it with others. Never ask others for their passwords, and never give your password to someone else. Page Ref: 15 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
22 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 2: Business Processes, Information Systems, and Information Multiple Choice 1) A ________ is a network of activities, roles, resources, repositories, and data flows that interact to accomplish a business function. A) workgroup B) task force C) grid D) business process Answer: D Page Ref: 27 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 2) ________ are specific tasks that need to be accomplished as part of the business process. A) Repositories B) Resources C) Activities D) Databases Answer: C Page Ref: 29 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 3) A ________ is a sub-set of the activities in a business process that is performed by an actor. A) sequence flow B) resource C) data flow D) role Answer: D Page Ref: 29 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
1 Copyright © 2014 Pearson Education, Inc.
4) Activities within a business process are shown in ________. A) circles B) rectangles C) squares D) diamonds Answer: B Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 5) According to the business process modeling notation, the start of a business process is symbolized by a ________. A) circle having a thick border B) circle having a narrow border C) square having a thick border D) square having a narrow border Answer: B Page Ref: 29 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 6) According to the business process modeling notation, the end of a business process is symbolized by a ________. A) circle having a thick border B) circle having a narrow border C) square having a thick border D) square having a narrow border Answer: A Page Ref: 29 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 7) A(n) ________ is a collection of data that is stored within the business records. A) repository B) role C) activity D) resource Answer: A Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
2 Copyright © 2014 Pearson Education, Inc.
8) ________ represent the movement of data from one activity to another. A) Data charts B) Data buses C) Data modules D) Data flows Answer: D Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 9) According to the business process modeling notation, an activity with a boxed plus sign inside it indicates a ________. A) sub-process B) data flow C) sequence flow D) data repository Answer: A Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 10) ________ is the ratio of benefits to costs. A) Effectiveness B) Efficiency C) Efficacy D) Effort Answer: B Page Ref: 31 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 11) What is the defining characteristic of the outermost components (hardware and people) of the IS framework? A) They take actions. B) They are the costliest components in the framework. C) They are both sets of instructions. D) They are sunk costs. Answer: A Page Ref: 32 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 3 Copyright © 2014 Pearson Education, Inc.
12) The software and procedure components of the IS framework are both ________. A) actors B) sets of instructions C) the outermost components D) bridges between the human side and the computer side Answer: B Page Ref: 32 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 13) The ________ component of the IS framework provides instructions for people. A) procedure B) software C) information D) data Answer: A Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 14) In the IS framework, ________ is/are the bridge between the computer side on the left and the human side on the right. A) procedures B) systems C) information technology D) data Answer: D Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
4 Copyright © 2014 Pearson Education, Inc.
15) Which of the following are actors in an information system? A) software and hardware B) procedures and people C) data and software D) hardware and people Answer: D Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 16) When work that was formerly done by people has been moved to computers, it is said to be ________. A) outsourced B) automated C) digitized D) motorized Answer: B Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 17) Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework. A) computer side to the human side B) data side to the procedures side C) human side to the computer side D) software side to the hardware side Answer: C Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
5 Copyright © 2014 Pearson Education, Inc.
18) ________ is defined as recorded facts or figures. A) Information B) Substance C) Data D) Content Answer: C Page Ref: 33 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 19) John Reed's height is 6 feet 3 inches. John's finding is an example of ________. A) data B) information C) substance D) content Answer: A Page Ref: 34 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 20) The fact that Joe Heisenberg works 9 hours per day is an example of ________. A) substance B) content C) information D) data Answer: D Page Ref: 34 Difficulty: Moderate Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 21) Which of the following refers to information that is based on correct and complete data, and has been processed correctly as expected? A) relevant information B) measurable information C) accurate information D) timely information Answer: C Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS)
6 Copyright © 2014 Pearson Education, Inc.
22) A monthly report that arrives 6 weeks late is an example of information that is not ________. A) timely B) relevant C) accurate D) sufficient Answer: A Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 23) Which of the following is a characteristic of good information? A) It must be freely available. B) It must be more than just barely sufficient. C) It must be based on incomplete data. D) It must be contextually relevant. Answer: D Page Ref: 37 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 24) As the CEO of a call center, which of the following information is good information for you? A) hourly variances of performance parameters in each queue B) daily reports of call abandons due to system downtime C) lists of stationery usage consolidated weekly D) department-level averages of revenue generation figures Answer: D Page Ref: 37 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 25) ________ information is information that directly pertains both to the context and to the subject . A) Timely B) Relevant C) Measurable D) Accurate Answer: B Page Ref: 37 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS)
7 Copyright © 2014 Pearson Education, Inc.
26) Which of the following is true regarding characteristics of good information? A) Information needs to be more than just barely sufficient for the purpose for which it is generated. B) Information must hold an appropriate relationship between its cost and its value. C) Information that is accurate can be based on incomplete data. D) Information must be just recorded facts and figures. Answer: B Page Ref: 37 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 27) ________ can be defined as the perceived difference between what is and what ought to be. A) A problem B) Egocentric thinking C) Empathetic thinking D) Cognition Answer: A Page Ref: 38 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 28) ________ thinking centers on the self. A) Paranoid B) Egocentric C) Cognitive D) Empathetic Answer: B Page Ref: 38 Difficulty: Easy AACSB: Ethical Understanding and Reasoning Abilities Study Question: Study Question 5 Learning Outcome: Discuss the ethical and social issues raised by the use of information systems
8 Copyright © 2014 Pearson Education, Inc.
29) People who engage in ________ thinking consider their view as one possible interpretation of the situation and actively work to learn what other people are thinking. A) empathetic B) cognitive C) egocentric D) paranoid Answer: A Page Ref: 38 Difficulty: Easy AACSB: Ethical Understanding and Reasoning Abilities Study Question: Study Question 5 Learning Outcome: Discuss the ethical and social issues raised by the use of information systems True or False 1) Members of a team in a company need to understand business processes since they need a better way of sharing vendor data. Answer: TRUE Page Ref: 26 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) To design an improved process, it is necessary to understand the existing process. Answer: TRUE Page Ref: 27 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 3) A role is a subset of activities in a business process. Answer: TRUE Page Ref: 29 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 4) Swimlane format is a graphical arrangement in which all of the activities for a given role are shown in a single vertical or horizontal lane. Answer: TRUE Page Ref: 29 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 9 Copyright © 2014 Pearson Education, Inc.
5) In some business processes, a role can be fulfilled by an information system. Answer: TRUE Page Ref: 29 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 6) According to the business process modeling notation standard, the start of a business process is symbolized by a circle having a thick border. Answer: FALSE Page Ref: 29 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 7) According to the business process modeling notation standard, the end of a business process is symbolized by a circle having a narrow border. Answer: FALSE Page Ref: 29 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 8) A collection of databases is an example of a repository. Answer: TRUE Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 9) Data flows represent the movement of data from one activity to another. Answer: TRUE Page Ref: 30 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
10 Copyright © 2014 Pearson Education, Inc.
10) A repository can be printed records stored in a shoebox, collection of files in the cloud, or computer databases. Answer: TRUE Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 11) Process quality can be measured in two dimensions: process effectiveness and process efficiency. Answer: TRUE Page Ref: 30 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 12) Buyers read vendor and product data from the vendor data repository, but they don't write them. Answer: FALSE Page Ref: 30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 13) Effectiveness is the ratio of benefits to cost. Answer: FALSE Page Ref: 31 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 14) An activity is considered automated when it is characterized by people following procedures. Answer: FALSE Page Ref: 32 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 15) The outermost components of the symmetrical five-component framework of an IS are data and procedures. Answer: FALSE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 11 Copyright © 2014 Pearson Education, Inc.
16) In the five-component framework of an IS, the actors are hardware and people. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 17) In the five-component framework of an IS, data is the bridge between the computer side and the human side. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 18) Software and procedure components are both sets of instructions, in the IS framework. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 19) Procedures act as the bridge between the computer and human sides of the five-component framework of an IS. Answer: FALSE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 20) Automation is the process in which instructions for humans are transferred to instructions for hardware. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
12 Copyright © 2014 Pearson Education, Inc.
21) Automation moves work from the software component to the data component. Answer: FALSE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 22) One of the major benefits of an information system is labor savings. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 23) Data that is summed is called information. Answer: TRUE Page Ref: 33 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 24) Information is data presented in a meaningful context. Answer: TRUE Page Ref: 34 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 25) Information is data processed by summing, ordering, averaging, grouping, comparing, or other similar operations. Answer: TRUE Page Ref: 34 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 26) The major benefit of automating a process is that the data stored in databases and other repositories can readily be processed to produce information. Answer: TRUE Page Ref: 32 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 13 Copyright © 2014 Pearson Education, Inc.
27) Data is knowledge derived from information. Answer: FALSE Page Ref: 33 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 28) Average wage is knowledge that can be derived from the data of individual wages. Answer: TRUE Page Ref: 34 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 29) Accuracy is important with information, but not crucial. As long as it is relevant and timely, it may not need to be complete. Answer: FALSE Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 30) A well-formatted report is characteristic of good information. Answer: FALSE Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 31) Accurate information is information that is based on correct and complete data, and has been processed correctly as expected. Answer: TRUE Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 32) The quality of our thinking is a large part of the quality of the information system we use, especially for unstructured processes. Answer: TRUE Page Ref: 36 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 14 Copyright © 2014 Pearson Education, Inc.
33) Just barely sufficient information is information that is sufficient for the purpose for which it is generated, but only so. Answer: TRUE Page Ref: 37 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 34) Relevant data are those which aptly pertain both to the context and to the subject. Answer: TRUE Page Ref: 37 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 35) The higher you rise into management, the more data you will need to ignore. Answer: TRUE Page Ref: 37 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Explain how information systems can be used to assist in decision making 36) For data to be worth its cost, an appropriate relationship must exist between the cost of data and its value. Answer: TRUE Page Ref: 37 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 37) Information systems should not be subject to the same financial analyses to which other assets are subjected to. Answer: FALSE Page Ref: 37 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
15 Copyright © 2014 Pearson Education, Inc.
Essay 1) What is a business process? Define activities. Answer: A business process is a network of activities, resources, facilities, and information that interact to achieve some business function. Activities are specific tasks that need to be accomplished as part of the process. Page Ref: 27 Difficulty: Easy Study Question: Study Question 2, 3 Learning Outcome: Discuss the role of information systems in supporting business processes 2) List the components of a business process. Answer: The components of a business process include: 1. Activities 2. Decisions 3. Roles 4. Resources 5. Repository 6. Data flow Page Ref: 27-30 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 3) Briefly describe a repository. Answer: A repository is a collection of data that is stored within the business process. A repository can be a cardboard box, a notebook, a list, an Excel spreadsheet, a database, or even a collection of databases. Repositories hold the collective memory of the organization. One of the major considerations in the design of information systems is determining how many repositories should exist, or, equivalently, how much data should be stored in particular repositories. Page Ref: 30 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) Briefly describe data flows. Answer: According to the business process modeling notation, the labeled dashed lines are called data flows. They represent the movement of data from one activity to another. The data can be delivered via email, text message, over the phone, by fax, or by some other means. The medium of the data delivery is also unimportant. For the level of our discussion, the format of the data item is also not important. Page Ref: 30 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
16 Copyright © 2014 Pearson Education, Inc.
5) Describe the process of automation against the background of the five-component framework of an information system. Answer: The five components of an information system are hardware, software, data, procedures, and people. They are arranged symmetrically in the framework. The outermost components, hardware and people, are both actors; they can take actions. The software and procedure components are both sets of instructions: Software is instructions for hardware, and procedures are instructions for people. Finally, data is the bridge between the computer side on the left and the human side on the right. When an activity in a business process is handled by an automated system, it means that work formerly done by people following procedures has been moved so that computers now do that work by following instructions in software. Thus, the automation of a process activity consists of moving work from the right-hand side of the fivecomponent IS framework to the left. Page Ref: 32-33 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 6) Define information. Answer: The most common definition of information is that information is knowledge derived from data, where data is defined as recorded facts or figures. Page Ref: 33 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 7) Explain data with an example. Answer: Data is defined as recorded facts or figures. The fact that an employee of an organization earns $17.50 per hour and that another employee of the same organization earns $25.00 per hour is an example of data. Page Ref: 33-34 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
17 Copyright © 2014 Pearson Education, Inc.
8) Define accurate information. Why is an information system providing accurate information crucial to an organization? Answer: Good information is accurate information, which is based on correct and complete data, and it has been processed correctly as expected. Accuracy is crucial; business professionals must be able to rely on the results of their information systems. The IS function can develop a bad reputation in the organization if a system is known to produce inaccurate information. In such a case, the information system becomes a waste of time and money as users develop work-arounds to avoid the inaccurate data. Page Ref: 36 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 9) Explain the importance of timeliness of information in an organization. Answer: Timely information is information that is produced in time for its intended use. A monthly report that arrives 6 weeks late is most likely useless. The information arrives long after the decisions have been made that needed that information. An information system that tells you not to extend credit to a customer after you have shipped the goods is unhelpful and frustrating. Notice that timeliness can be measured against a calendar (6 weeks late) or against events (before we ship). Page Ref: 36 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 10) In some cases, developing systems that provide information in near real time is much more difficult and expensive than producing information a few hours later. Provide an example that supports this statement. Answer: A person who works in marketing needs to be able to assess the effectiveness of new online ad programs. He wants an information system that will not only deliver ads over the Web, but one that will also enable him to determine how frequently customers click on those ads. In this case, determining click ratios in near real time will be very expensive; saving the data in a batch and processing it some hours later will be much easier and cheaper. If you can manage with data that is a day or two old, the system will be easier and cheaper to implement. Page Ref: 36 Difficulty: Moderate AACSB: Reflective Thinking Skills Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
18 Copyright © 2014 Pearson Education, Inc.
11) What role does an individual's thinking play in the five components of an information system? Answer: When you consider the five components of an information system, the last component, people, includes you. Your mind and thinking are the most important components of the information systems you use. Even if you have the perfect information system, if you do not know what to do with the information that it produces, you are wasting your time and money. The quality of your thinking is a large part of the quality of the information system. Page Ref: 36 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 12) Define relevant data. Explain the importance of relevant data in an organizational context. Answer: Relevant data is data that directly pertains to both the context and to the subject. Considering context, you, the CEO, need data that is summarized to an appropriate level for your job. A list of the hourly wage of every employee in the company is unlikely to be useful. More likely, you need average wage information by department or division. A list of all employee wages is irrelevant in this context. Data should also be relevant to the subject at hand. If you want data about short-term interest rates for a possible line of credit, then a report that shows 15-year mortgage interest rates is irrelevant. Page Ref: 37 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 13) Explain the importance of just barely sufficient data in the information age we live in. Answer: Just barely sufficient data is data that is sufficient for the purpose for which it is generated, but only so. We live in an information age; one of the critical decisions that each of us has to make each day is what data to ignore. The higher you rise into management, the more data you will be given, and because there is only so much time, the more data you will need to ignore. So data should be sufficient, but just barely. Page Ref: 37 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
19 Copyright © 2014 Pearson Education, Inc.
14) What are the costs associated with information? When is information considered to be worth its cost? Answer: Information is not free. There are costs for developing an information system, costs of operating and maintaining that system, and costs of your time and salary for reading and processing the information the system produces. For information to be worth its cost, an appropriate relationship must exist between the cost of information and its value. Page Ref: 37 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
20 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 3: Organizational Strategy, Information Systems, and Competitive Advantage Multiple Choice 1) Porter originally developed the five forces model to determine ________. A) the potential profitability of an industry B) the nature of competitive industrial environments C) the reason why certain industries collapse D) the means by which to improve industrial viability Answer: A Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 2) The competitive strategy followed by an organization is derived from its ________. A) function B) structure C) profits D) goals Answer: B Page Ref: 52 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 3) The competitive strategy of an organization determines its ________. A) industry rivals B) short-term goals C) value chains D) structure Answer: C Page Ref: 49 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
1 Copyright © 2014 Pearson Education, Inc.
4) In which of the following situations would the suppliers have the strongest bargaining power? A) coffee planters during a season of frost that decreases production B) companies negotiating compensation during a booming economy C) providers of logistic support during an economic slowdown D) a wholesaler declaring a stock-clearance sale Answer: A Page Ref: 50 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5) Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. By doing this, which of the following forces is Simpson's addressing? A) the control exercised by Acme Corp. who supplies Simpson with lawn mowers B) the power held by the landlord of the Simpson's office space C) the threat posed by Roger's Landscapes, a new competitor D) the bargaining power of the City Football Club who are Simpson's customers Answer: C Page Ref: 50-51 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 6) Porter's five competitive forces can be grouped into two types: forces related to ________ and forces related to supply chain bargaining power. A) pricing B) labor C) competition D) consumers Answer: C Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
2 Copyright © 2014 Pearson Education, Inc.
7) Porter's model includes the bargaining power of which of the following groups as one of the five factors? A) investors B) competitors C) employees D) customers Answer: D Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 8) In Porter's five factor model, each of the three competitive forces concerns the danger of ________. A) suppliers favoring rival companies B) customers taking their business elsewhere C) investors refusing to back up new projects D) employees not working toward organizational goals Answer: B Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 9) Two strength factors that relate to all three competitive forces are ________ and customer loyalty. A) market forces B) nature of products C) customer satisfaction D) switching costs Answer: D Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 10) In which of the following cases is the strength of competitive forces low? A) when switching costs are high B) when rival products are priced high C) when customer loyalty to the brand or company is low D) when finding rival products is easy Answer: A Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 3 Copyright © 2014 Pearson Education, Inc.
11) If customers perceive the benefits of a substitute to be similar to that of a product, then ________. A) the threat from the substitute is weak B) the price of the product should be increased to retain market share C) the threat from the substitute is strong D) there is no threat from the substitute Answer: C Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 12) The strength of bargaining power forces depends on the availability of substitutes and ________ compared to the size of suppliers or customers. A) the amount of profit made annually B) the relative size of the firm C) the presence of competitors in the market D) the threat of new competitors Answer: B Page Ref: 50-51 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 13) An organization responds to the structure of its industry by choosing a(n) ________ strategy. A) competitive B) growth C) leadership D) operational Answer: A Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 14) If a company produces a uniquely formulated anti-ageing face cream targeted at women above the age of forty, which of the following competitive strategies is it following? A) industry-wide low cost B) industry-wide differentiation C) focused low cost D) focused differentiation Answer: D Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 4 Copyright © 2014 Pearson Education, Inc.
15) Which of the following is an example of a competitive strategy employed by a firm? A) increasing the price of its product when raw material prices increase B) laying off staff in order to cut down costs during a recession period C) advertising its products nationwide like its competitor organizations D) launching a unique product targeted at a section of consumers Answer: D Page Ref: 52 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 16) According to Porter, to be effective, the organization's goals, objectives, culture, and activities must be consistent with the ________. A) organization's structure B) organization's competitors C) organization's strategy D) organization's workforce Answer: C Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 17) Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service. A) margin B) profit C) price D) value Answer: D Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 18) Which of the following is true of a value-chain? A) It is a network of value-creating activities. B) It consists of only primary activities. C) It is specific to manufacturing industries. D) It nullifies the importance of support activities. Answer: A Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 5 Copyright © 2014 Pearson Education, Inc.
19) A business that selects a differentiation strategy would ________. A) add cost to an activity provided it has a positive margin B) provide essential functions at lowest costs C) imitate rival companies' strategy and products D) aim to please stockholders with highest dividends Answer: A Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 20) The difference between the value that an activity generates and the cost of the activity is called the ________. A) equity B) liability C) overhead D) margin Answer: D Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 21) Collecting, storing, and physically distributing the product to buyers describes which of the following primary activities? A) inbound logistics B) sales and marketing C) outbound logistics D) operations/management Answer: C Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 22) Inducing buyers to purchase the product and providing a means for them to do so describes which of the following primary activities? A) inbound logistics B) sales and marketing C) outbound logistics D) operations/management Answer: B Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 6 Copyright © 2014 Pearson Education, Inc.
23) Each stage of the value chain not only adds value to the product but also ________. A) attracts buyers B) accumulates costs C) devalues the final product D) attracts competitors Answer: B Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 24) Which of the following is a primary activity in the value chain? A) processes of finding vendors B) setting up contractual arrangements C) negotiating prices D) delivering products to consumers Answer: D Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 25) ________ includes general management, finance, accounting, legal, and government affairs. A) Human resources B) Research and development C) Firm infrastructure D) Operations management Answer: C Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 26) Porter's model of business activities includes ________, which are interactions across value activities. A) linkages B) evaluations C) iterations D) operations Answer: A Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
7 Copyright © 2014 Pearson Education, Inc.
27) Manufacturing systems that use linkages also use ________ to plan production. A) past reports B) sales forecasts C) competitors' information D) software packages Answer: B Page Ref: 54 Difficulty: Moderate Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 28) Manufacturing systems use ________ to reduce inventory costs. A) linkages B) margins C) value chains D) support activities Answer: A Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 29) As Porter says, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins. A) create sufficient value to cover their costs B) provide products at lowest costs to customers C) make it easy for products to be duplicated D) give stiff competition to other similar products Answer: A Page Ref: 56 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 30) Which of the following is a product implementation principle of competitive advantage? A) raise barriers to market entry B) enhance products or services C) establish alliances D) lock in customers and buyers Answer: B Page Ref: 56 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
8 Copyright © 2014 Pearson Education, Inc.
31) Which of the following strategies is also called establishing high switching costs? A) establishing alliances B) locking in suppliers C) reducing costs D) locking in customers Answer: D Page Ref: 56 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 32) Which of the following is a process implementation principle of competitive advantage? A) creating a new product B) enhancing a product C) establishing alliances D) differentiating a product Answer: C Page Ref: 56 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 33) Which of the following is least likely to be an outcome of organizations forming alliances with each other? A) promotion of product awareness B) development of market size C) establishment of standards D) increase in purchasing costs Answer: D Page Ref: 58 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage True or False 1) Competitive strategy determines an organization's value chain. Answer: TRUE Page Ref: 49 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
9 Copyright © 2014 Pearson Education, Inc.
2) Porter originally developed the five forces model in order to understand organizations' competitive environment. Answer: FALSE Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 3) According to Porter's five forces model, a company is profitable if all the five competitive forces are strong. Answer: FALSE Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 4) The bargaining power of competitors is one of the competitive forces identified by Porter. Answer: FALSE Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5) The three competitive forces in Porter's model concern the danger of customers taking their business elsewhere. Answer: TRUE Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 6) If the costs of switching to another vendor are high, then the strength of the competitive forces is low. Answer: TRUE Page Ref: 50 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 7) The strength of bargaining power forces does not depend on the availability of substitutes. Answer: FALSE Page Ref: 51 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
10 Copyright © 2014 Pearson Education, Inc.
8) Typically, as an individual, a customer has substantial bargaining power to a large manufacturing industry. Answer: FALSE Page Ref: 51 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 9) An organization can choose to either minimize cost or maximize differentiation to gain a competitive advantage. Answer: TRUE Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 10) Focused differentiation is a strategy in which the product is unique and is used by a wide range of consumers. Answer: FALSE Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 11) According to Porter, to be effective, the organization's goals, objectives, culture, and activities must be consistent with the organization's strategy. Answer: TRUE Page Ref: 52 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 12) Organizations analyze the structure of their industry, and, using that analysis, they formulate a competitive strategy. Answer: TRUE Page Ref: 52 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 13) A business that selects a differentiation strategy would always structure itself around leastcost activities. Answer: FALSE Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 11 Copyright © 2014 Pearson Education, Inc.
14) The difference between the value that an activity generates and the cost of the activity is called the margin. Answer: TRUE Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 15) Porter's definition of technology is narrow, as it only includes research and development. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 16) Support activities are business functions that relate directly to the production of the organization's products or services. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 17) A business with a cost strategy will add cost to an activity only as long as the activity has a positive margin. Answer: FALSE Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 18) Each stage of the generic value chain accumulates costs and subtracts value from the product. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 19) The support activities in the generic value chain facilitate the primary activities and contribute only indirectly to production, sale, and service of the product. Answer: TRUE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 12 Copyright © 2014 Pearson Education, Inc.
20) Receiving, storing, and disseminating inputs to the product falls under the operation function of primary activity. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 21) A company uses the outbound logistics activity to deliver the finished product to a customer. Answer: TRUE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 22) Porter's model of business activities includes linkages, which are interactions across value activities. Answer: TRUE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 23) Firm infrastructure excludes general management, finance, accounting, legal, and government affairs. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 24) Supporting activities contribute to a margin and are easier to calculate than primary activities. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 25) Value chain analysis has a direct application to manufacturing businesses. Answer: TRUE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
13 Copyright © 2014 Pearson Education, Inc.
26) Manufacturing systems avoid linkages to reduce inventory costs. Answer: FALSE Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 27) Business processes implement value chains or portions of value chains. Answer: TRUE Page Ref: 55 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 28) Each value chain is supported by one or more business processes. Answer: TRUE Page Ref: 55 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 29) No matter what competitive strategy is being used, the value chain activities remain the same. Answer: TRUE Page Ref: 56 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 30) If the value chain's margin is negative, the company must make some change. Answer: TRUE Page Ref: 56 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 31) An information system can be part of a product, but it cannot provide support for a product or service. Answer: FALSE Page Ref: 56 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes
14 Copyright © 2014 Pearson Education, Inc.
32) Raising barriers to market entry is a product implementation principle. Answer: FALSE Page Ref: 56 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 33) Establishing alliances with other organizations promotes product awareness. Answer: TRUE Page Ref: 56 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes Essay 1) Briefly describe how organizational strategy determines the structure of information systems. Answer: Organizations examine the structure of their industry and, from that, develop a competitive strategy. That strategy determines value chains, which, in turn, determine business processes. The nature of business processes determines the requirements and functions of information systems. Page Ref: 48-49 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 2) Describe Porter's five forces model. Answer: Organizational strategy begins with an assessment of the fundamental characteristics and structure of an industry. Porter's five forces model is used as a way of understanding organizations' competitive environments. Porter's five competitive forces can be grouped into two types: forces related to competition and forces related to supply chain bargaining power. The competitive forces are: competition from vendors of substitutes, competition from new competitors, and competition from existing rivals. The bargaining power forces include the bargaining power of suppliers and the bargaining power of customers. The intensity of each of the five forces determines the characteristics of the industry, how profitable it is, and how sustainable that profitability will be. Organizations examine these five forces and determine how they intend to respond to them. That examination leads to competitive strategy. Page Ref: 49-50 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
15 Copyright © 2014 Pearson Education, Inc.
3) What are the four competitive strategies based on Porter's five forces model? Answer: An organization responds to the structure of its industry by choosing a competitive strategy. Porter followed his five forces model with the model of four competitive strategies. According to Porter, a firm can engage in one of these four fundamental competitive strategies. An organization can focus on being the cost leader, or it can focus on differentiating its products from those of the competition. Further, the organization can employ the cost or differentiation strategy across an industry or it can focus its strategy on a particular industry segment. According to Porter, to be effective the organization's goals, objectives, culture, and activities must be consistent with the organization's strategy. Page Ref: 52 Difficulty: Moderate Study Question: Study Question 3 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 4) How does competitive strategy determine value chain structure? Answer: Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. A value chain is a network of value-creating activities. Organizations analyze the structure of their industry, and, using that analysis, they formulate a competitive strategy. They then need to organize and structure the organization to implement that strategy. If, for example, the competitive strategy is to be a cost leader, then business activities need to be developed to provide essential functions at the lowest possible cost. A business that selects a differentiation strategy would not necessarily structure itself around least-cost activities. Instead, such a business might choose to develop more costly systems, but it would do so only if those systems provided benefits that outweighed their risks. Page Ref: 52-53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5) Distinguish between a primary and a support activity in the value chain. Answer: Primary activities are business functions that relate directly to the production of the organization's products or services. Support activities are business functions that assist and facilitate the primary activities. Page Ref: 53-54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 6) Differentiate between value and margin. Answer: Porter defined value as the amount of money that a customer is willing to pay for a resource, product, or service. The difference between the value that an activity generates and the cost of the activity is called the margin. A business with a differentiation strategy will add cost to an activity only as long as the activity has a positive margin. Page Ref: 53 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 16 Copyright © 2014 Pearson Education, Inc.
7) Describe, using an example, the primary activities in a value chain. Answer: In a bicycle manufacturing unit the primary activities of a value chain are followed. The manufacturer acquires raw materials using the inbound logistics activity. This activity concerns the receiving and handling of raw materials and other inputs. The accumulation of those materials adds value in the sense that even a pile of unassembled parts is worth something to some customer. A collection of the parts needed to build a bicycle is worth more than an empty space on a shelf. The value is not only the parts themselves, but also the time required to contact vendors for those parts, to maintain business relationships with those vendors, to order the parts, to receive the shipment, and so forth. In the operations activity, the bicycle maker transforms raw materials into a finished bicycle, a process that adds more value. Next, the company uses the outbound logistics activity to deliver the finished bicycle to a customer. Of course, there is no customer to send the bicycle to without the marketing and sales value activity. Finally, the service activity provides customer support to the bicycle users. Page Ref: 53-54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 8) What is a value chain? List the primary activities in a value chain. Answer: A value chain is a network of value-creating activities. The generic value chain developed by Porter consists of five primary activities and three support activities. The primary activities are: a. In-bound logistics-which deals with receiving, storing, and disseminating inputs to the product b. Operations-which involves transforming inputs into the final product c. Out-bound logistics-which deals with collecting, storing, and physically distributing the product to buyers d. Marketing and sales-which involves inducing buyers to purchase the product and providing a means for them to do so e. Customer service-which involves assisting customer's use of the product and thus maintaining and enhancing the product's value Page Ref: 54 Difficulty: Moderate Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 9) Explain value chain linkages. Answer: Porter's model of business activities includes linkages, which are interactions across value activities. For example, manufacturing systems use linkages to reduce inventory costs. Such a system uses sales forecasts to plan production; it then uses the production plan to determine raw materials needs and then uses the material needs to schedule purchases. The end result is just-in-time inventory, which reduces inventory sizes and costs. Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 17 Copyright © 2014 Pearson Education, Inc.
10) How did Porter define technology, human resources and firm infrastructure? Answer: Porter defined technology broadly. It includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures. He defined human resources as recruiting, compensation, evaluation, and training of full-time and part-time employees. Finally, firm infrastructure includes general management, finance, accounting, legal, and government affairs. Page Ref: 54 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 11) Describe the support activities in a value chain. Answer: The support activities in the generic value chain facilitate the primary activities and contribute only indirectly to the production, sale, and service of the product. They include procurement, which consists of the processes of finding vendors, setting up contractual arrangements, and negotiating prices. Porter defined technology broadly. It includes research and development, but it also includes other activities within the firm for developing new techniques, methods, and procedures. He defined human resources as recruiting, compensation, evaluation, and training of full-time and part-time employees. Finally, firm infrastructure includes general management, finance, accounting, legal, and government affairs. Supporting functions add value, albeit indirectly, and they also have costs. Page Ref: 54 Difficulty: Moderate Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 12) What is the criterion on which business processes should run? Answer: According to Porter, whether business processes are low-cost or high-service, these processes and systems must create sufficient value that they will more than cover their costs. If not, the margin of those systems will be negative. If a value chain's margin is negative, the company must make some change. Either the value must be increased, or the costs of the value chain need to be reduced. Page Ref: 56 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes
18 Copyright © 2014 Pearson Education, Inc.
19
13) How can one develop competitive strategies using products? How can information systems help in the process? Answer: Some competitive techniques are created through products and services while some are created through the development of business processes. There are three principles that concern products and services. Organizations gain a competitive advantage by: a. creating new products or services b. enhancing existing products or services c. differentiating their products and services from those of their competitors An information system can be part of a product or it can provide support for a product or service. Page Ref: 56 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 14) Describe some competitive advantage strategies that are based on business processes. Answer: Some of the competitive strategies that are based on business processes include: a. Establishing high switching costs-organizations can lock in customers by making it difficult or expensive for customers to switch to another product. b. Locking in suppliers-organizations can lock in suppliers by making it difficult to switch to another organization, or, stated positively, by making it easy to connect to and work with the organization. c. Creating entry barriers-competitive advantage can be gained by creating entry barriers that make it difficult and expensive for new competition to enter the market. d. Establishing alliances-another means to gain competitive advantage is to establish alliances with other organizations. e. Finally, by creating better business processes, organizations can gain competitive advantage by reducing costs. Page Ref: 57-58 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 6 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
19 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 4: Hardware and Software Multiple Choice 1) Which device listed below is an example of an output hardware device? A) keyboard B) flatbed plotter C) CPU D) magnetic disk Answer: B Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) Which of the following is considered to be input hardware? A) keyboard B) printers C) speakers D) screen projectors Answer: A Page Ref: 75 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) One ________ = 1024 kilobytes. A) terabyte B) megabyte C) gigabyte D) bit Answer: B Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
1 Copyright © 2014 Pearson Education, Inc.
4) All computer data is represented by ________, irrespective of type. A) dots B) pixels C) tags D) bits Answer: D Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 5) A computer with a quad-processor has ________ CPUs. A) 8 B) 4 C) 2 D) 16 Answer: B Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 6) Which of the following patterns represents the value 11011? A) closed; closed; open; closed; closed B) open; closed; open; open; closed C) closed; open; open; open; closed D) open; closed; closed; open; open Answer: A Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
2 Copyright © 2014 Pearson Education, Inc.
7) One ________ is equivalent to 1024 gigabytes. A) petabyte B) terabyte C) megabyte D) kilobyte Answer: B Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 8) A ________ is 1,024 bytes. A) kilobyte B) megabyte C) gigabyte D) terabyte Answer: A Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 9) The CPU has a small amount of very fast memory called ________. A) the main memory B) a data channel C) a serial bus D) a cache Answer: D Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
3 Copyright © 2014 Pearson Education, Inc.
10) To execute an instruction, data is moved from the main memory to the CPU via the ________. A) bus B) operating system C) cache D) application Answer: A Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) A(n) ________ is a program that controls the computer's resources. A) cache B) operating system C) CPU D) bus Answer: B Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 12) When there is not enough memory to load additional programs in the main memory, the operating system removes some programs/data and replaces it with the newly requested programs/data through a process called ________. A) data labeling B) force programming C) memory swapping D) data paging Answer: C Page Ref: 78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
4 Copyright © 2014 Pearson Education, Inc.
13) CPU speed is expressed in ________. A) hertz B) bytes C) bits D) meters per second Answer: A Page Ref: 78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 14) Which of the following is true of a 32-bit CPU? A) It cannot effectively utilize more than 4GB of main memory. B) It has a higher speed than any other processor. C) It is ideal for creating large, complicated spreadsheets. D) It is more expensive than the 64-bit CPU. Answer: A Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 15) Memory is said to be ________ if contents are lost when power is off. A) cached B) volatile C) random D) swapped Answer: B Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following is part of volatile memory? A) magnetic disk B) magnetic tape C) optical disk D) cache Answer: D Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 17) Users employ ________ computers for word processing, spreadsheets, database access, and so forth. A) client B) cached C) licensed D) volatile Answer: A Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 18) Which of the following is true of a client? A) They usually have multiple CPUs. B) They have software that enables them to connect to a network. C) They have limited video displays or no display at all. D) They can process emails or large shared databases. Answer: B Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
6 Copyright © 2014 Pearson Education, Inc.
19) Which of the following is true of a server? A) Single but powerful CPUs are used by all servers. B) Extensive video displays characterize all servers. C) Processing shared databases is one of its functions. D) Servers cannot process emails and Web sites. Answer: C Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 20) For some commercial Web sites, the server is actually a large collection of computers, called a ________, that coordinates all of their activities. A) networking terminal B) workstation C) server farm D) data bus Answer: C Page Ref: 80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 21) Every computer has a(n) ________, which is a program that controls that computer's resources. A) operating system B) browser C) central processing unit D) instruction set Answer: A Page Ref: 80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
7 Copyright © 2014 Pearson Education, Inc.
22) Which of the following operating systems was developed by the open source community? A) Opera B) Windows C) Linux D) Mac OS Answer: C Page Ref: 81 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 23) Which of the following operating systems is most commonly used? A) Linux B) Windows C) Unix D) Mac OS Answer: B Page Ref: 82 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 24) Programs that control the server computer's resources are ________. A) client operating systems B) client application programs C) server operating systems D) server application programs Answer: C Page Ref: 83 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
8 Copyright © 2014 Pearson Education, Inc.
25) An individual buying a computer program ________. A) accrues liability for the usage of the program B) can install the program on multiple computers C) just buys a license to use the product D) can also use most other programs using the license Answer: C Page Ref: 85 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 26) ________ is the process whereby multiple operating systems share the same hardware. A) Machine coding B) Virtualization C) License sharing D) Cloud computing Answer: B Page Ref: 84 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 27) A grocery scanning checkout system is an example of ________. A) vertical-market software B) horizontal-market software C) a one-of-a-kind application D) an operating system Answer: A Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
9 Copyright © 2014 Pearson Education, Inc.
28) Software that provides capabilities common across all organizations and industries is known as ________ software. A) vertical-market application B) market-wide C) horizontal-market application D) generic-application Answer: C Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 29) Application programs that require programs other than a browser on a user's computer are called ________. A) thin-client applications B) horizontal applications C) vertical applications D) thick-client applications Answer: D Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 30) Which of the following is true of thick-client applications? A) A thick-client application is an application program that need not be preinstalled on the client. B) All other things being equal, thin-client applications are preferred over thick client applications. C) A thick-client application does not require preinstallation of client code. D) In large organizations which use thick-client applications, update installation and version management are inexpensive. Answer: B Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
10 Copyright © 2014 Pearson Education, Inc.
31) Which of the following is true of in-house custom-developed software? A) They are less expensive than off-the-shelf software. B) The organization has to tailor its applications to the software. C) They are easy and comparatively cheap to make. D) Custom-developed software require no adaption even if needs change. Answer: B Page Ref: 88 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 32) ________ is a type of computer software which is installed in special, read-only memory in devices like printers or communication devices. A) Firmware B) Instruction set C) Operating system D) Browser Answer: A Page Ref: 89 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 33) ________ is computer code as written by humans and that is understandable by humans. A) Open source B) Machine code C) Source code D) Native code Answer: C Page Ref: 90 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies
11 Copyright © 2014 Pearson Education, Inc.
True or False 1) Hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. Answer: TRUE Page Ref: 75 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) Printers are examples of output hardware. Answer: TRUE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) A flatbed plotter is an example of an input device. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 4) The CPU selects instructions, processes them, performs arithmetic and logical comparisons, and stores results of operations in memory. Answer: TRUE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
12 Copyright © 2014 Pearson Education, Inc.
5) Optical disks are the most common storage devices. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 6) A dual-processor computer has 16 or more CPUs. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 7) A quad-processor computer has two CPUs. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 8) USB connectors complicated the connection of peripheral gear to computers for users. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 9) Main memory is also called cache memory. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
13 Copyright © 2014 Pearson Education, Inc.
10) DVDs are the most common storage devices. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) A switch representation of the binary notation 1010 will be open; closed; open; open. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 12) All computer data are represented by bits. Answer: TRUE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 13) The term byte stands for binary digit. Answer: FALSE Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 14) A specification that a computing device has 100 million bytes of memory means that the device could hold up to 100 million characters. Answer: TRUE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
14 Copyright © 2014 Pearson Education, Inc.
15) A gigabyte is 1,024 terabytes. Answer: FALSE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 16) An exabyte is 1,024 petabytes. Answer: TRUE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 17) A terabyte is a larger unit than a petabyte. Answer: FALSE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 18) To run a program or process data, the CPU must first transfer the program or data from disk to main memory. Answer: TRUE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 19) To execute an instruction, the CPU moves the instruction from main memory via the cache. Answer: FALSE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
15 Copyright © 2014 Pearson Education, Inc.
20) The CPU keeps rarely used instructions in the cache. Answer: FALSE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 21) The most frequently used instructions are stored in the cache. Answer: TRUE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 22) Main memory of the computer contains instructions for the operating system (OS). Answer: TRUE Page Ref: 77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 23) Memory swapping is the process of transferring data between the main memory and the cache. Answer: FALSE Page Ref: 78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 24) When you work on a spreadsheet program like Excel, the program is loaded into the cache for processing. Answer: FALSE Page Ref: 78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 16 Copyright © 2014 Pearson Education, Inc.
25) CPU speed is expressed in cycles called hertz. Answer: TRUE Page Ref: 78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 26) Saving your work frequently is advised to tackle the issue of memory volatility. Answer: TRUE Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 27) Most servers do not have a video display or even a keyboard. Answer: TRUE Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 28) Server computers need lots of main memory and very large disks. Answer: TRUE Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 29) Magnetic and optical disks are nonvolatile. Answer: TRUE Page Ref: 79 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
17 Copyright © 2014 Pearson Education, Inc.
30) A server farm can process only one service request per minute. Answer: FALSE Page Ref: 80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 31) Large sites that require numerous servers will organize them through a data farm. Answer: FALSE Page Ref: 80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 32) Virtualization is the process by which one computer hosts the appearance of many computers. Answer: TRUE Page Ref: 84 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 33) A thin-client application is an application program that must be preinstalled on the client. Answer: FALSE Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 34) A thick-client application is one that runs within a browser and does not need to be preinstalled. Answer: FALSE Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies
18 Copyright © 2014 Pearson Education, Inc.
Essay 1) Describe the basic components of a generic computer. Answer: In a generic computer, hardware consists of electronic components and related gadgetry that input, process, output, and store data according to instructions encoded in computer programs or software. Typical input hardware devices are the keyboard, mouse, document scanners, and bar-code scanners. Processing devices include the central processing unit (CPU), which is sometimes called the "brain" of the computer. The CPU works in conjunction with main memory. Main memory is sometimes called RAM, for random access memory. Computers also can have special function cards that can be added to the computer to augment the computer's basic capabilities. Output hardware consists of video displays, printers, audio speakers, overhead projectors, and other special-purpose devices. Storage hardware saves data and programs. The magnetic disk is by far the most common storage device, although optical disks such as CDs and DVDs also are popular. Page Ref: 75-76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) What are bits? Explain the various methods of representing binary notation. Answer: Computers represent data using binary digits called bits. A bit is either a zero or a one. Bits are used for computer data because they are easy to represent physically and electronically. Binary notations are sometimes represented through switches. A switch can be either closed or open. A computer can be designed so that an open switch represents zero and a closed switch represents one. The orientation of a magnetic field is also used to represent a bit; magnetism in one direction represents a zero, magnetism in the opposite direction represents a one. Finally, for optical media, small pits are burned onto the surface of the disk so that they will reflect light. In a given spot, a reflection means a one; no reflection means a zero. Page Ref: 76 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies
19 Copyright © 2014 Pearson Education, Inc.
3) Describe how computer data is sized. Answer: All computer data are represented by bits. The data can be numbers, characters, currency amounts, photos, recordings, or whatever. All are simply a string of bits. Bits are grouped into 8-bit chunks called bytes. For character data, such as the letters in a person's name, one character will fit into one byte. Bytes are used to measure sizes of noncharacter data as well. For example, a given picture can be said to be 100,000 bytes in size. This statement means the length of the bit string that represents the picture is 100,000 bytes or 800,000 bits (because there are 8 bits per byte). The specifications for the size of main memory, disk, and other computer devices are expressed in bytes. A kilobyte, abbreviated K, is a collection of 1,024 bytes. A megabyte, or MB, is 1,024 kilobytes. A gigabyte, or GB, is 1,024 megabytes, a terabyte or TB, is 1,024 gigabytes, a petabyte, or PB, is 1,024 terabytes, and an exabyte, or EB, is 1,024 petabytes. Page Ref: 76-77 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 4) Briefly describe how a computer works. Answer: The CPU (central processing unit) is the major actor. To run a program or process data, the computer must first transfer the program or data from disk to main memory. Then, to execute an instruction, it moves the instruction from main memory into the CPU via the data channel or bus. The CPU has a small amount of very fast memory called a cache. The CPU keeps frequently used instructions in the cache. Main memory of the computer contains program instructions for application programs and a browser. It also contains instructions for the operating system. Main memory is too small to hold all of the programs and data that a user may want to process. Consequently, the CPU loads programs into memory in chunks. If the user opens another program or needs to load more data, the operating system will direct the CPU to attempt to place the new program or data into unused memory. If there is not enough memory, it will remove something, and then it will place the just-requested program or data into the vacated space. This process is called memory swapping. Page Ref: 77-78 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
20 Copyright © 2014 Pearson Education, Inc.
5) Differentiate between client and server computers. Answer: Users employ client computers for word processing, spreadsheets, database access, and so forth. Most client computers also have software that enables them to connect to a network. Servers provide some service. Some servers process email; others process Web sites; others process large, shared databases; and some provide all of these functions or other similar functions. Server computers need to be faster, larger, and more powerful than client computers. They usually have multiple CPUs. Servers typically have limited video displays. Many servers have no display at all, because they are only accessed from another computer via the network. For large commerce sites, the server is actually a large collection of computers (called a server farm) that coordinate all of their activities. Page Ref: 79-80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 6) Differentiate between an operating system and an application program. Answer: Every computer has an operating system, which is a program that controls that computer's resources. Some of the functions of an operating system are to read and write data, allocate main memory, perform memory swapping, start and stop programs, respond to error conditions, and facilitate backup and recovery. In addition, the operating system creates and manages the user interface, including the display, keyboard, mouse, and other devices. Although the operating system makes the computer usable, it does little application-specific work. To write a document or query a customer database, application programs such as Microsoft Word or Oracle's customer relationship management (CRM) software are needed. These programs must be licensed in addition to the operating system. Page Ref: 80 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
21 Copyright © 2014 Pearson Education, Inc.
7) What are the two important software constraints? Explain with suitable examples. Answer: A particular version of an operating system is written for a particular type of hardware. For example, Microsoft Windows works only on processors from Intel and companies that make processors that conform to the Intel instruction set (the commands that a CPU can process). Furthermore, the 32-bit version of Windows runs only on Intel computers with 32-bit CPUs, and the 64-bit version of Windows runs only on Intel computers with 64-bit CPUs. Second, application programs are written to use a particular operating system. Microsoft Access, for example, will run only on the Windows operating system. Some applications come in multiple versions. There are, for example, Windows and Macintosh versions of Microsoft Word. But unless informed otherwise, it is safe to assume that a particular application runs on just one operating system. Page Ref: 81 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 8) List the four major operating systems and their usages. Answer: The four major operating systems are Windows, Mac OS, Unix, and Linux. a. For business users, the most important operating system is Microsoft Windows. Some version of Windows resides on more than 85 percent of the world's desktops, and considering just business users, the figure is more than 95 percent. Microsoft offers many different versions of Windows, the current version being Windows 8. b. Apple Computer, Inc., developed its own operating system for the Macintosh, Mac OS. The current system is named Mac OS X. Macintosh computers are used primarily by graphic artists and workers in the arts community. c. Unix is an operating system that was developed at Bell Labs in the 1970s. It has been the workhorse of the scientific and engineering communities since then. Unix is generally regarded as being more difficult to use than either Windows or the Macintosh. d. Linux is a version of Unix that was developed by the open source community. This community is a loosely coupled group of programmers who mostly volunteer their time to contribute code to develop and maintain Linux. The open source community owns Linux, and there is no fee to use it. Linux can run on client computers, but it is most frequently used on servers, particularly Web servers. Page Ref: 81 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
22 Copyright © 2014 Pearson Education, Inc.
9) What is virtualization? Answer: Virtualization is the process by which one computer hosts the appearance of many computers. For example, with virtualization one server can support two instances of Windows Server, one instance of Linux, and three instances of Windows. Because these instances are isolated, it will appear to each that it has exclusive control over the server computer. Because of virtualization, it is quite easy for cloud vendors to reconfigure servers to support changes in workload. Page Ref: 84 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 10) How can individuals and firms buy computer programs? Answer: When one buys a computer program, it does not mean actually buying that program. Instead, one is buying a license, which is the right to use a certain number of copies of that program subject to limits on the vendor's liability. Large organizations do not buy a license for each computer user. Instead, they negotiate a site license, which is a flat fee payment for the right to install the product (operating system or application) on all of that company's computers or on all of the computers at a specific site. Page Ref: 85 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) What is unique about Linux as an operating system? Answer: Linux is a version of Unix that was developed by the open source community. In case of Linux, no company can sell a license to use it. It is owned by the open source community, which states that Linux has no license fee (with certain reasonable restrictions). Large companies such as IBM, and smaller companies such as Red Hat can make money by supporting Linux, but no company makes money selling Linux licenses. Page Ref: 85 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
23 Copyright © 2014 Pearson Education, Inc.
12) What are the different categories of application programs? Answer: Application software consists of programs that perform a service or a function. Some application programs are general purpose. Other application programs provide specific functions. a. Horizontal-market application software provides capabilities common across all organizations and industries. Word processors, graphics programs, spreadsheets, and presentation programs are all horizontal-market application software. Examples of such software are Microsoft Word, Excel, and PowerPoint. b. Vertical-market application software serves the needs of a specific industry. Examples of such programs are those used by dental offices to schedule appointments and bill patients. Vertical applications usually can be altered or customized. c. One-of-a-kind application software is developed for a specific, unique need. The IRS develops such software, for example, because it has needs that no other organization has. Page Ref: 86 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 13) What are the drawbacks of developing custom application software for an organization? Answer: Organizations develop custom application software themselves or hire a development vendor. By developing custom software, the organization can tailor its application to fit its requirements. Custom development is difficult and risky. Staffing and managing teams of software developers is challenging. Managing software projects can be daunting. Many organizations have embarked on application development projects only to find that the projects take twice as long—or longer—to finish as planned. For custom software developed in-house the developing company must pay all of the adaptation costs itself. Over time, this cost burden is heavy. Because of the risk and expense, in-house development is the last-choice alternative and is used only when there is no other option. Page Ref: 88 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies
24 Copyright © 2014 Pearson Education, Inc.
14) What is firmware? Answer: Firmware is computer software that is installed into devices such as printers, print servers, and various types of communication devices. The software is coded just like other software, but it is installed into special, read-only memory of the printer or other device. In this way, the program becomes part of the device's memory; it is as if the program's logic is designed into the device's circuitry. Users do not need to load firmware into the device's memory. Firmware can be changed or upgraded, but this is normally a task for IS professionals. The task is easy, but it requires knowledge of special programs and techniques that most business users choose not to learn. Page Ref: 89 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 15) How does open source work? How is different from closed source projects? Answer: The term open source means that the source code of the program is available to the public. Source code is computer code as written by humans and that is understandable by humans. Source code is compiled into machine code that is processed by a computer. Machine code is, in general, not understandable by humans and cannot be modified .In a closed source project, say Microsoft Office, the source code is highly protected and only available to trusted employees and carefully vetted contractors. The source code is protected like gold in a vault. Only those trusted programmers can make changes to a closed source project. With open source, anyone can obtain the source code from the open source project's Web site. Programmers alter or add to this code depending on their interests and goals. In most cases, programmers can incorporate code they find into their own projects. They may be able to resell those projects depending on the type of license agreement the project uses. Open source succeeds because of collaboration. A programmer examines the source code and identifies a need or project that seems interesting. He or she then creates a new feature, redesigns or reprograms an existing feature, or fixes a known problem. That code is then sent to others in the open source project who then evaluate the quality and merits of the work and add it to the product, if appropriate. Page Ref: 90-92 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies
25 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 5: Database Processing Multiple Choice 1) The purpose of a database is to ________. A) use special technology to monitor a single theme B) design, write, test, troubleshoot, and maintain the source code of computer programs C) use a logical data model of information to describe and build architectures D) help people keep track of things Answer: D Page Ref: 107 Difficulty: Easy1
AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) A ________ is a self-describing collection of integrated records. A) datasheet B) datachart C) database D) data record Answer: C Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) Which of the following describes a byte? A) a character of data B) a group of rows C) a collection of data D) a group of columns Answer: A Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) Characters of data are grouped into ________. A) bytes B) columns C) rows D) records Answer: B Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) Bytes are grouped into columns, which are also called ________. A) records B) tables C) files D) fields Answer: D Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) Columns are grouped into rows, which are also called ________. A) records B) fields C) tables D) files Answer: A Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 7) The collection of data for all columns is called a ________. A) record B) field C) file D) table Answer: A Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 2 Copyright © 2014 Pearson Education, Inc.
8) A group of similar rows is called a ________. A) table B) record C) field D) matrix Answer: A Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) A table is also called a ________. A) record B) matrix C) file D) field Answer: C Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) What is metadata? A) data that cannot be used as an information resource B) special data that describes the structure of a database C) data that describes a Web page D) special data that is unique to a specific user Answer: B Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
11) A ________ is a column or group of columns that identifies a unique row in a table. A) field B) record C) file D) key Answer: D Page Ref: 109 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 12) Columns that are keys of a different table than the one in which they reside are known as ________ keys. A) foreign B) discrete C) relational D) variable Answer: A Page Ref: 110 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 13) Databases that carry their data in the form of tables are called ________ databases. A) foreign B) variable C) relational D) discrete Answer: C Page Ref: 110 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
14) A more formal name for a table is ________. A) matrix B) field C) record D) relation Answer: D Page Ref: 110 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 15) The name of the field and the data type would be an example of ________. A) an open matrix B) datamining factors C) metadata D) a closed matrix Answer: C Page Ref: 111 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 16) A ________ is a program used to create, process, and administer a database. A) metadata system B) knowledge management system C) database management system D) database application system Answer: C Page Ref: 113 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 17) Which of the following is a DBMS product from Microsoft? A) MySQL B) SQL Server C) DB2 D) Sybase ASE Answer: B Page Ref: 113 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 5 Copyright © 2014 Pearson Education, Inc.
18) ________ is a popular enterprise DBMS product from IBM. A) DB2 B) Access C) SQL Server D) MySQL Answer: A Page Ref: 113 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 19) Which of the following is a function of the DBMS? A) enabling multiuser processing B) tracking sample data C) preparing reports D) processing the database Answer: D Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 20) For which of the following operations do applications use DBMS? A) send emails B) write a software program C) modify data D) track sample data Answer: C Page Ref: 113 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
6 Copyright © 2014 Pearson Education, Inc.
21) SQL stands for ________. A) Standard Query Language B) Secondary Query Language C) Structured Query Language D) Simplified Query Language Answer: C Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 22) ________ is an international standard language for processing a database. A) Hypertext Markup Language B) Dynamic HTML C) Structured Query Language D) Sybase Language Answer: C Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 23) During which of the following functions of a database are tools provided for assistance? A) creating the database B) modifying the database C) administering the database D) processing the database Answer: C Page Ref: 114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
24) Which of the following functions of a database involves setting up user accounts, passwords, permissions, and limits for processing the database? A) administering the database B) creating the database C) modifying the database D) processing the database Answer: A Page Ref: 114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 25) A ________ is a collection of reports, forms, and queries that process a database. A) database application B) database function C) database management system D) database structure Answer: A Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 26) ________ are used to read, insert, modify, and delete data. A) Markup language codes B) Query forms C) Data entry forms D) Data access programs Answer: C Page Ref: 116 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
27) In a typical database application, a(n) ________ shows data in a structured context. A) application B) entry form C) query form D) report Answer: D Page Ref: 116 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 28) To locate something in the database, one must type the keyword into the ________ of the application. A) report B) query form C) data entry form D) data access column Answer: B Page Ref: 116 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 29) Which of the following is true of a database application? A) A database can have only one application, and each application has one user. B) It provides tools to assist in the administration of the database. C) Application programs process logic that is specific to a given business need. D) It uses hypertext markup language to process information in a database. Answer: C Page Ref: 117 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
30) To prevent the ________ problem, locking must be used to coordinate the activities of users who know nothing about one another. A) data integrity B) redundancy C) lost-update D) data access Answer: C Page Ref: 117 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 31) ________ products process large organizational and workgroup databases. A) Relational DBMS B) Personal DBMS C) Enterprise DBMS D) Structured DBMS Answer: C Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 32) Which of the following is an example of an enterprise DBMS product? A) Paradox B) dBase C) FoxPro D) DB2 Answer: D Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
33) Which of the following is true of enterprise DBMS products? A) Enterprise DBMS products are designed for small and simple database applications. B) Enterprise DBMS products manage databases that span dozens of different magnetic disks. C) Paradox is an example of an enterprise DBMS product. D) The great bulk of databases in enterprise DBMS products have only a single user. Answer: B Page Ref: 118 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 34) ________ products are designed for smaller, simpler database applications. A) Relational DBMS B) Personal DBMS C) Enterprise DBMS D) Structured DBMS Answer: B Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 35) ________ is an example of a personal DBMS product. A) DB2 B) FoxPro C) Oracle Database D) SQL Server Answer: B Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 36) Which of the following is true of personal DBMS products? A) Personal DBMS products are designed for simple database applications. B) Personal DBMS products support many users. C) Personal DBMS products can manage databases that span dozens of different magnetic disks. D) IBM's DB2 is an example of a personal DBMS product. Answer: A Page Ref: 118 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 11 Copyright © 2014 Pearson Education, Inc.
37) ________ refers to software systems that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud. A) NoSQL DBMS B) MySQL DBMS C) Enterprise DBMS D) Personal DBMS Answer: A Page Ref: 119 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases True or False 1) Databases are required to keep track of lists with multiple themes. Answer: TRUE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) A database is a self-describing collection of integrated records. Answer: TRUE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) Bytes, which are characters of data, are grouped into rows. Answer: FALSE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) Columns are also called records. Answer: FALSE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 12 Copyright © 2014 Pearson Education, Inc.
5) The collection of data for all columns is called a file. Answer: FALSE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) A group of similar rows or records is called a table. Answer: TRUE Page Ref: 108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 7) A key is a column or a group of columns that identifies a unique row in a table. Answer: TRUE Page Ref: 109 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) Databases that carry their data in the form of tables and that represent relationships using foreign keys are called discrete databases. Answer: FALSE Page Ref: 110 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) The format of metadata depends on the software product that is processing the database. Answer: TRUE Page Ref: 111 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
13 Copyright © 2014 Pearson Education, Inc.
10) To find out what a database contains, we just look at the metadata inside the database. Answer: TRUE Page Ref: 111 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 11) Pure database data in raw form are most pertinent and useful. Answer: FALSE Page Ref: 111 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) Each of the elements of the database application system calls on the database management system to process the database tables. Answer: TRUE Page Ref: 113 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) Most organizations develop their own DBMS. Answer: FALSE Page Ref: 113 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 14) DB2 is a popular DBMS product that is licensed from Microsoft. Answer: FALSE Page Ref: 113 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
14 Copyright © 2014 Pearson Education, Inc.
15) Hypertext Markup Language is an international standard language for processing a database. Answer: FALSE Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 16) SQL statements can be issued directly to the DBMS by an application program. Answer: TRUE Page Ref: 114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 17) DBMS administrative functions include adding structures to improve the performance of database applications. Answer: TRUE Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 18) A database cannot have more than one application running on it. Answer: FALSE Page Ref: 114 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 19) Query forms are used to read, insert, modify, and delete data. Answer: FALSE Page Ref: 116 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
15 Copyright © 2014 Pearson Education, Inc.
20) Application programs process logic that is specific to a given business need. Answer: TRUE Page Ref: 117 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 21) The application program serves as an intermediary between the Web server and the database. Answer: TRUE Page Ref: 117 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 22) The lost-update problem can be prevented by a type of locking which must be used to coordinate the activities of users who know nothing about one another. Answer: TRUE Page Ref: 117 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 23) Enterprise DBMS products are designed for smaller, simpler database applications. Answer: FALSE Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 24) The great bulk of databases in personal DBMS products have only a single user. Answer: TRUE Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
16 Copyright © 2014 Pearson Education, Inc.
25) Paradox and FoxPro are examples of personal DBMS products. Answer: TRUE Page Ref: 118 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 26) MySQL DBMS refers to software systems that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud. Answer: FALSE Page Ref: 119 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 27) NoSQL DBMS products are very technical and can be used only by those with a deep background in computer science. Answer: TRUE Page Ref: 119 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases Essay 1) What are the differences between a spreadsheet and a database? Answer: The purpose of both a spreadsheet and a database is to keep track of things. However, unlike a spreadsheet, a database offers the solution of being able to keep track of more than one type of data. Lists of data involving a single theme can be stored in a spreadsheet. However, lists that involve multiple themes require a database. Page Ref: 107-108 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
17 Copyright © 2014 Pearson Education, Inc.
2) Describe the contents of a database. Answer: A database is a self-describing collection of integrated records that is organized based on a hierarchy of data elements. A byte is a character of data. Bytes are grouped into columns. Columns are also called fields. A key is a column or group of columns that identifies a unique row in a table. Columns that are keys of a different table than the one in which they reside are called foreign keys. Columns or fields, in turn, are grouped into rows, which are also called records. Finally, a group of similar rows or records is called a table or a file. A database contains, within itself, a description of its contents. Metadata are data that describe data. Thus, a database is a collection of tables plus relationships among the rows in those tables, plus special data, called metadata, that describes the structure of the database. Page Ref: 108-111 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) What are relational databases? Answer: Databases that carry their data in the form of tables and that represent relationships using foreign keys are called relational databases. Foreign keys are columns that are keys of a different table than the one in which they reside. (The term relational is used because another, more formal name for a table is relation.) Page Ref: 110 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) Describe the usefulness of metadata. Answer: A database is self-describing in that it contains, within itself, a description of its contents. This is because it contains not only data, but also data about the data in the database. This data is known as metadata. It is the presence of metadata that makes databases much more useful than spreadsheets or data in other lists. Because of metadata, no one needs to guess, remember, or even record what is in the database. To find out what a database contains, we just look at the metadata inside the database. Page Ref: 110-111 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
18 Copyright © 2014 Pearson Education, Inc.
5) What is the function of a database application system? Answer: A database, all by itself, is not very useful. Pure database data are correct, but in raw form they are not pertinent or useful. A database application system makes database data more accessible and useful. Users employ a database application that consists of forms, formatted reports, queries, and application programs. Each of these, in turn, calls on the database management system (DBMS) to process the database tables. Page Ref: 113-114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 6) Explain database management systems. Answer: A database management system (DBMS) is a program used to create, process, and administer a database. A DBMS is different from a database in that a DBMS is a software program while a database is a collection of tables, relationships, and metadata. Almost no organization develops its own DBMS. Instead, companies license DBMS products from vendors such as IBM, Microsoft, Oracle, and others. Popular DBMS products are DB2 from IBM, Access and SQL Server from Microsoft, and Oracle from the Oracle Corporation. Another popular DBMS is MySQL, an open source DBMS product that is license-free for most applications. Page Ref: 113 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
19 Copyright © 2014 Pearson Education, Inc.
7) Describe the functions of a database management system. Answer: A database management system (DBMS) is a program used to create, process, and administer a database. a. Database developers use the DBMS to create tables, relationships, and other structures in the database. To create a new table, the developer just fills out a new table's metadata into the form. To modify an existing table—for example, to add a new column—the developer opens the metadata form for that table and adds a new row of metadata. b. The second function of the DBMS is to process the database. The DBMS provides applications for four operations: to read, insert, modify, or delete data. The applications call upon the DBMS in different ways. From a form, when the user enters new or changed data, a computer program that processes the form calls the DBMS to make the necessary database changes. From an application program, the program calls the DBMS directly to make the change. c. A third DBMS function is to provide tools to assist in the administration of the database. Database administration involves a wide variety of activities. For example, the DBMS can be used to set up a security system involving user accounts, passwords, permissions, and limits for processing the database. d. In addition to security, DBMS administrative functions include backing up database data, adding structures to improve the performance of database applications, removing data that are no longer wanted or needed, and similar tasks. Page Ref: 113-114 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 8) How does one create a database and its structures? Answer: Database developers use the DBMS to create tables, relationships, and other structures in the database. A form is used to define a new table or to modify an existing one. To create a new table, the developer just fills the new table's metadata into the form. To modify an existing table–for example, to add a new column–the developer opens the metadata form for that table and adds a new row of metadata. For example, the developer adds a new column called "Response?" to a table. This new column has the data type "Yes/No," which means that the column can contain only one value–Yes or No. The person using this form will use this column to indicate whether he/she has responded to the student's email. Other database structures are defined in similar ways. Page Ref: 113-114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
20 Copyright © 2014 Pearson Education, Inc.
9) Define SQL. Answer: Structured Query Language (SQL) is an international standard language for processing a database. All DBMS products accept and process SQL statements. One need not understand or remember SQL language syntax. Instead, one needs to just realize that SQL is an international standard for processing a database. Also, SQL can be used to create databases and database structures. Page Ref: 114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 10) What is a database application? Answer: A database application is a collection of forms, reports, queries, and application programs that process a database. A database may have one or more applications, and each application may have one or more users. These applications have different purposes, features, and functions, but they all process the same inventory data stored in a common database. Page Ref: 114 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 11) Briefly describe the elements of a database application. Answer: A database application is a collection of forms, reports, queries, and application programs that process a database. Data entry forms are used to read, insert, modify, and delete data. Reports show data in a structured context. DBMS programs provide comprehensive and robust features for querying database data. The DBMS provides a facility to type a keyword into a query form to find what one is looking for. There are also database application programs for applications that have unique requirements that a simple form, report, or query cannot meet. Page Ref: 115-116 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
21 Copyright © 2014 Pearson Education, Inc.
12) How are database application programs useful? Answer: Most applications have unique requirements that a simple form, report, or query cannot meet. In such cases, database application programs come into play. Application programs process logic that is specific to a given business need, and enable database processing over the Internet. For this use, the application program serves as an intermediary between the Web server and the database. The application program responds to events, such as when a user presses a submit button; it also reads, inserts, modifies, and deletes database data. Page Ref: 116-117 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 13) How can one prevent the lost-update problem of multi-user processing? Answer: The lost-update problem exemplifies one of the special characteristics of multi-user database processing. To prevent this problem, some type of locking must be used to coordinate the activities of users who know nothing about one another. Page Ref: 117 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 14) Explain enterprise DBMS products. Answer: Enterprise DBMS products process large organizational and workgroup databases. These products support many users, perhaps thousands, and many different database applications. Such DBMS products support 24/7 operations and can manage databases that span dozens of different magnetic disks with hundreds of gigabytes or more of data. IBM's DB2, Microsoft's SQL Server, and Oracle's Oracle Database are examples of enterprise DBMS products. Page Ref: 118 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) What are personal DBMS products? Answer: Personal DBMS products are designed for smaller, simpler database applications. Such products are used for personal or small workgroup applications that involve fewer than 100 users, and normally fewer than 15. In fact, the great bulk of databases in this category have only a single user. In the past, there were many personal DBMS products - Paradox, dBase, R:base, and FoxPro. Today, the only remaining personal DBMS is Microsoft Access. Page Ref: 118 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 22 Copyright © 2014 Pearson Education, Inc.
16) What is a NoSQL DBMS? Answer: A few years back, Amazon.com determined that relational database technology wouldn't meet its processing needs, and it developed a nonrelational data store called Dynamo. Google (developed Bigtable) and Facebook (developed Cassandra) also followed suit. Such nonrelational DBMS have come to be called NoSQL DBMS. This term refers to software systems that support very high transaction rates processing relatively simple data structures, replicated on many servers in the cloud. The rise of NoSQL does mean that, for large organizational IS, choosing a relational DBMS is no longer automatic. NoSQL DBMS products are very technical and can be used only by those with a deep background in computer science. Page Ref: 118-119 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
23 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 6: Data Communication and the Cloud Multiple Choice 1) The distinguishing characteristic of a LAN is ________. A) that it connects at multiple locations B) that it connects at a single location C) that it is a network of networks D) that all lines need not reside at the same geographic location Answer: B Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 2) A ________ connects computers at different geographic locations. A) LAN B) WAN C) VPN D) SOHO LAN Answer: B Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 3) The computers in two separate company sites must be connected using a ________. A) LAN B) WAN C) SOHO LAN D) MAC Answer: B Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
1 Copyright © 2014 Pearson Education, Inc.
4) A ________ is used to provide seamless flow of data across networks. A) layered protocol B) point-to-point protocol C) switch D) UTP Answer: A Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 5) A(n) ________ is a set of rules that two communicating devices follow. A) domain B) attribute C) protocol D) database Answer: C Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 6) A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN. A) protocol B) switch C) domain D) SOHO LAN Answer: B Page Ref: 132 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
2 Copyright © 2014 Pearson Education, Inc.
7) Each device on the LAN has a hardware component called the ________ that connects the device's circuitry to the cable. A) UTP B) switch C) NIC D) POP Answer: C Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 8) In order for a printer or a laptop to connect to a wireless LAN, it must have a ________. A) WNIC B) UTP C) POP D) VPN Answer: A Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 9) The IEEE 802.3 protocol standard is also known as ________. A) TCP/IP B) Ethernet C) Bluetooth D) HTTP Answer: B Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
3 Copyright © 2014 Pearson Education, Inc.
10) The WNIC devices connect to a(n) ________, which is the component of the LAN device that processes wireless traffic and communicates with the wired switch. A) router B) PSDN C) optical fiber cable D) access point Answer: D Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) Which protocol standard used for wired LAN connections specifies hardware characteristics, such as which wire carry which signals? A) intranet B) WiMax C) Ethernet D) EVDO Answer: C Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 12) Which of the following statements about LAN protocols is true? A) The access point uses both the 802.3 and 802.11 standards. B) The IEEE 802.11 protocol is also called Ethernet. C) The switch operates on the 802.11 standard. D) WNICs operate on the 802.3 protocol and communicate with the switch. Answer: A Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
4 Copyright © 2014 Pearson Education, Inc.
13) Devices such as wireless mice and keyboards use ________ to connect to the computer. A) NIC B) broadband C) cable D) Bluetooth Answer: D Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 14) Which of the following protocols is commonly used by LAN? A) IEEE 802.3 B) DSL C) EVDO D) WiMax Answer: A Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 15) What is the protocol commonly used for wireless LAN? A) IEEE 802.11n B) EVDO C) DSL D) IEEE 802.3 Answer: A Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following is true of an ISP? A) An ISP converts digital data in the user's computer to an analog signal. B) An ISP facilitates a one-way information transfer process between the user's computer and the Internet. C) An ISP provides free access to the Internet. D) An ISP serves as a user's gateway to the Internet. Answer: D Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 17) Which of the following is true of DSL modems? A) DSL modems use television lines for data transmission. B) Their signals do not interfere with voice telephone service. C) DSL modems use the same protocols as cable modems. D) DSL services and speed are standardized across applications. Answer: B Page Ref: 135 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 18) Which of the following is true of cable modems? A) Cable modems provide high-speed data transmission using telephone cables. B) Performance of cable modems is stable irrespective of the number of users sending and receiving data. C) Cable modems generally use the same protocols as DSL modems. D) The signals from cable modems do not interfere with TV signals. Answer: D Page Ref: 135 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet
6 Copyright © 2014 Pearson Education, Inc.
19) Narrowband lines typically have transmission speeds less than ________. A) 256 kbps B) 56 kbps C) 126 kbps D) 64 kbps Answer: B Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 20) Which of the following purposes does an HTTP protocol serve? A) flow among switches and access points B) provide reliable internet transporting C) enable communication among programs D) conduct internet routing Answer: C Page Ref: 138 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 21) The S in HTTPS stands for ________. A) site B) safety C) speed D) secure Answer: D Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 22) One very common use of FTP is to ________. A) maintain Web sites B) transmit emails C) format responses D) implement protocol Answer: A Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 7 Copyright © 2014 Pearson Education, Inc.
23) The ________ is the Internet-based network of browsers and servers that process HTTP or HTTPS. A) FTP B) SMTP C) Web D) Data link Answer: C Page Ref: 139 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 24) Which of the following provides reliable internet transport? A) HTTP B) TCP C) FTP D) DSL Answer: B Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 25) When an individual uses the Internet, but not the Web, he or she is using ________. A) FTP B) HTTP C) SOAP D) XUP Answer: A Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet
8 Copyright © 2014 Pearson Education, Inc.
26) What is an IP address? A) It is a protocol that specifies the routing of the pieces of your data communication through the networks that comprise any internet (including the Internet). B) It is a number that identifies a particular device. C) It is a piece of a message that is handled by programs that implement IP. D) It is a program that breaks your traffic up into pieces and sends each piece along its way. Answer: B Page Ref: 140 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 27) A ________ must be used to convert a computer's digital data to an analog, or wavy, signal. A) tunnel B) switch C) modem D) router Answer: C Page Ref: 141 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 28) A(n) ________ is a unique name that is affiliated with a public IP address. A) tag B) protocol C) domain name D) assigned name Answer: C Page Ref: 141 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
9 Copyright © 2014 Pearson Education, Inc.
29) Which of the following means an address on the Internet? A) FTP B) DSL C) URL D) ISP Answer: C Page Ref: 141 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 30) What is a VPN? A) It is a markup language that fixes several HTML deficiencies and is commonly used for program-to-program interaction over the Web. B) It is an add-on to browsers that was developed by Adobe and is useful for providing animation, movies, and other advanced graphics inside a browser. C) It is the most common language for defining the structure and layout of Web pages. D) It uses the Internet to create private point-to-point connections. Answer: D Page Ref: 142 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet 31) Which of the following is true of VPN? A) VPN communications are secure even though they are transmitted over the public Internet. B) One disadvantage of VPN is that it does not encrypt messages. C) Remote access is difficult in case of VPN. D) It is a virtual, private pathway over a public or shared network from the client to the server. Answer: A Page Ref: 142 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet
10 Copyright © 2014 Pearson Education, Inc.
32) Which of the following is a component of the user tier? A) computers that have browsers that request and process Web pages B) computers that run Web servers and process application programs C) computers that run a DBMS that processes SQL requests D) computers that work to minimize customer delays in a facility called a Web farm Answer: A Page Ref: 144 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 33) In the three-tier architecture arrangement, what is the second tier? A) Web tier B) database tier C) server tier D) user tier Answer: C Page Ref: 144 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 34) A ________ receives requests from users via the Web server, takes some action, and returns a response to the users via the Web server. A) database server B) commerce server C) URL D) Web farm Answer: B Page Ref: 145 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet
11 Copyright © 2014 Pearson Education, Inc.
35) Which of the following is true of Web servers? A) They are not programs. B) They run on a user tier computer. C) They can manage items in a shopping cart. D) They send and receive Web pages to and from clients. Answer: D Page Ref: 145 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet 36) ________ is the most common language for defining the structure and layout of Web pages. A) HTML B) VPN C) Flash D) XML Answer: A Page Ref: 145 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet True or False 1) With a WAN, an organization can place communications lines wherever it wants because all lines reside on its premises. Answer: FALSE Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 2) A protocol is a set of rules that two communicating devices follow. Answer: TRUE Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
12 Copyright © 2014 Pearson Education, Inc.
3) A Local Area Network (LAN) would be used to connect computers located in Seattle and Philadelphia. Answer: FALSE Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 4) A SOHO LAN requires that a dozen or more computers and printers be connected. Answer: FALSE Page Ref: 132 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 5) LAN connections cannot be made with optical fiber cables. Answer: FALSE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 6) Each wired computer or printer on the LAN has a network interface card (NIC). Answer: TRUE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 7) An access point is a special-purpose computer that receives and transmits wired traffic on the LAN. Answer: FALSE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 13 Copyright © 2014 Pearson Education, Inc.
8) Very few LAN connections are made using unshielded twisted pair (UTP) cable. Answer: FALSE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 9) Optical fiber cables carry light ray signals. Answer: TRUE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 10) The most popular protocol for WAN is the IEEE 802.3 protocol. Answer: FALSE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 11) The IEEE 802.3 protocol is used for wired LAN connections. Answer: TRUE Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 12) Wireless mice use Bluetooth to connect to the computer. Answer: TRUE Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
14 Copyright © 2014 Pearson Education, Inc.
13) Bluetooth is a protocol that can transmit data over long distances. Answer: FALSE Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 14) DSL operates on the same lines as voice telephones. Answer: TRUE Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 15) Leased lines are also called PSDN. Answer: TRUE Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 16) Cable modems provide high-speed data transmission using phone lines. Answer: FALSE Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 17) Narrowband lines have speeds greater than 256 kbps. Answer: FALSE Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet
15 Copyright © 2014 Pearson Education, Inc.
18) Broadband lines have speeds less than 56 kbps. Answer: FALSE Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 19) The protocols used on the Internet are arranged according to a structure known as the TCP/IP Protocol architecture. Answer: TRUE Page Ref: 138 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 20) The TCP/IP Protocol architecture is a scheme of a single protocol type. Answer: FALSE Page Ref: 138 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 21) An HTTPS connection is a secure connection. Answer: TRUE Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 22) File Transfer Protocol is used for email transmissions. Answer: FALSE Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet
16 Copyright © 2014 Pearson Education, Inc.
23) An access name is a unique name that is affiliated with a public IP address. Answer: FALSE Page Ref: 141 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 24) Routers convert digital data into analog signals. Answer: FALSE Page Ref: 141 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 25) A tunnel is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. Answer: TRUE Page Ref: 142 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 26) A Virtual Private Network (VPN) is a type of LAN. Answer: FALSE Page Ref: 142 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 27) The user tier consists of computers, phones, and other devices. Answer: TRUE Page Ref: 144 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
17 Copyright © 2014 Pearson Education, Inc.
28) The server tier consists of computers that run a DBMS that processes SQL requests to retrieve and store data. Answer: FALSE Page Ref: 144 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 29) To ensure acceptable performance, commercial Web sites usually are supported by several or even many Web server computers in a facility called a Web farm. Answer: TRUE Page Ref: 145 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 30) Hyperlinks are pointers to other Web pages. Answer: TRUE Page Ref: 145 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different ways of connecting to the Internet Essay 1) What is the difference between a LAN and a WAN? Give an example of how each one could be used in business. Answer: A local area network (LAN) connects computers that reside in a single geographic location on the premises of the company that operates the LAN. Wide area networks (WANs) connect computers at different geographic locations. The computers in two separated company sites must be connected using a WAN. With a LAN, the number of connected computers can range from two to several hundred, but they are still in a single location (usually within a building or floor of a building). Most small businesses have a LAN in their office that connects them. For example: a university campus uses a backbone (usually fiber optic) to connect all the different buildings on the campus and possibly multiple campuses on the university's WAN. Page Ref: 131 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
18 Copyright © 2014 Pearson Education, Inc.
2) What is an NIC? Why is it important to a LAN? Answer: Each wired computer or printer on the LAN has a network interface card (NIC), which is a device that connects the computer's or printer's circuitry to the network wires. The NIC works with programs in each device to implement the protocols necessary for communication. Most computers today ship from the factory with an onboard NIC, which is an NIC built into the computer's circuitry. Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) How does a wireless NIC work? Answer: The WNIC devices connect to an access point, which is the component of the LAN device that processes wireless traffic and communicates with the wired switch. Thus, with this design every device on the LAN, whether wired or wireless, can communicate with every other device. Wireless devices communicate to each other via the access point. If wireless devices need to connect to a wired device, they do so via the access point, then to the switch, and then to the wired devices. Similarly, wired devices communicate to each other via the switch. If the wired devices need to connect to wireless ones, they do so via the switch, then to the access point, and then to the wireless devices. Page Ref: 133 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 4) What is Bluetooth? What are its uses? Answer: Bluetooth is a common wireless protocol. It is designed for transmitting data over short distances, replacing cables. Some devices, such as wireless mice and keyboards, use Bluetooth to connect to the computer. Smartphones use Bluetooth to connect to automobile entertainment systems. Page Ref: 134 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
19 Copyright © 2014 Pearson Education, Inc.
5) What are the three important functions of an ISP? Answer: An ISP has three important functions. First, it provides the client with a legitimate Internet address. Second, it serves as a gateway to the Internet. The ISP receives the communications from the client's computer and passes them on to the Internet, and it receives communications from the Internet and passes them on to the client. Finally, ISPs pay for the Internet. They collect money from their customers and pay access fees and other charges on their behalf. Page Ref: 134-135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 6) What are cable modems? Answer: Cable modems provide high-speed data transmission using cable television lines. The cable company installs a fast, high-capacity optical fiber cable to a distribution center in each neighborhood that it serves. At the distribution center, the optical fiber cable connects to regular cable-television cables that run to subscribers' homes or businesses. Cable modems modulate in such a way that their signals do not interfere with TV signals. Because up to 500 user sites can share these facilities, performance varies depending on how many other users are sending and receiving data. At the maximum, users can download data up to 50 Mbps and can upload data at 512 kbps. Page Ref: 135 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different ways of connecting to the Internet 7) What is the IP Protocol architecture? Answer: The protocols used on the Internet are arranged according to a structure known as the TCP/IP Protocol architecture, which is a scheme of five protocol types arranged in layers. The top layer concerns protocols for applications such as browsers and Web servers. The next two layers concern protocols about data communications across any internet, including the Internet. The bottom two layers involve protocols that concern data transmission within a network. For example, the IEEE 802.3 and 802.11 LAN protocols operate at the bottom two layers. Page Ref: 138 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet
20 Copyright © 2014 Pearson Education, Inc.
8) Name some common application layer protocols. Answer: The TCP/IP application layer protocols are common. SMTP, or Simple Mail Transfer Protocol, is used for email transmissions (along with other protocols as well). And FTP, or File Transfer Protocol, is used to move files over the Internet. One very common use for FTP is to maintain Web sites. When a Web site administrator wishes to post a new picture or story on a Web server, the administrator will often use FTP to move the picture or other item to the server. Page Ref: 138-139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 9) Explain Transmission Control Protocol (TCP). Answer: The most important protocol in the transport layer is TCP, or the Transmission Control Protocol. As a transport protocol, TCP has many complicated functions. One easily understood function is that TCP programs break traffic up into pieces and send each piece along its way. It then works with TCP programs on other devices in the internet to ensure that all of the pieces arrive at their destination. If one or more pieces are lost or damaged, TCP programs detect that condition and cause retransmission of that piece. Hence, the TCP layer is said to provide reliable internet transport. Page Ref: 139 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet 10) Differentiate between private and public IP addresses. Answer: Public IP addresses identify a particular device on the public Internet. Because public IP addresses must be unique, worldwide, their assignment is controlled by a public agency known as ICANN (Internet Corporation for Assigned Names and Numbers). Private IP addresses identify a particular device on a private network, usually on a LAN. Their assignment is controlled within the LAN, usually by the "LAN device". Page Ref: 140 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different ways of connecting to the Internet
21 Copyright © 2014 Pearson Education, Inc.
11) What is a domain name? What is the procedure to get a domain name? Answer: A domain name is a worldwide-unique name that is affiliated with a public IP address. When an organization or individual wants to register a domain name, it goes to a company that applies to an ICANN-approved agency to do so. The company will first determine if the desired name is unique, worldwide. If so, then it will apply to register that name to the applicant. Once the registration is completed, the applicant can affiliate a public IP address with the domain name. From that point onward, traffic for the new domain name will be routed to the affiliated IP address. Page Ref: 141 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 12) What is a VPN and how does it work? Answer: VPN stands for a virtual private network and is an alternative to a WAN. A VPN uses the Internet or a private internet to create the appearance of private point-to-point connections. This connection, called a tunnel, is a virtual, private pathway over a public or shared network from the VPN client to the VPN server. Page Ref: 142 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 13) What are the different tiers in the three-tier architecture? Answer: Almost all e-commerce applications use the three-tier architecture, which is an arrangement of user computers and servers into three categories, or tiers. The user tier consists of computers, phones, and other devices that have browsers that request and process Web pages. The server tier consists of computers that run Web servers and process application programs. The database tier consists of computers that run a DBMS that processes SQL requests to retrieve and store data. Page Ref: 144 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
22 Copyright © 2014 Pearson Education, Inc.
14) What is the difference between a Web server and a commerce server? Answer: Web servers are programs that run on a server-tier computer and that manage HTTP traffic by sending and receiving Web pages to and from clients. A commerce server is an application program that runs on a server-tier computer. A commerce server receives requests from users via the Web server, takes some action, and returns a response to the users via the Web server. Typical commerce server functions are to obtain product data from a database, manage the items in a shopping cart, and coordinate the checkout process. Page Ref: 145 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
23 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 7: Organizations and Information Systems Multiple Choice 1) Which of the following is true of personal information systems? A) Personal information systems that support a particular department are sometimes called departmental information systems. B) Adapting to changes in personal information systems is difficult. C) Such systems have only one user and hence procedures need not be documented or formalized in any way. D) The solutions to problems in a personal information system usually involve more than one department. Answer: C Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 2) Which of the following is an example of a personal information system? A) scheduling of groundskeeping B) contact manager C) charging of membership fees D) ordering of restaurant supplies from suppliers Answer: B Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) Which of the following is an example of a workgroup information system? A) charging of membership fees B) contact manager C) accounts payable system D) ordering of restaurant supplies from suppliers Answer: C Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
1 Copyright © 2014 Pearson Education, Inc.
4) A Web store front is an example of a(n) ________. A) interenterprise information system B) collaborative information system C) functional information system D) departmental information system Answer: C Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 5) Which of the following is true for workgroup information systems? A) Workgroup information systems that support a particular department are sometimes called functional information systems. B) Workgroup information systems that support a particular business function are called departmental information systems. C) Workgroup information systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by levels of security authorization. D) Typically workgroup systems support 10 to 100 users. Answer: D Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 6) Which of the following statements about enterprise information systems is true? A) Its users do not require any formal training. B) It leads to data duplication among employees. C) Users of such systems undergo formal procedure training. D) It is easy to manage change to enterprise information systems. Answer: C Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
2 Copyright © 2014 Pearson Education, Inc.
7) Which of the following stands true for enterprise information systems? A) Enterprise information systems are information systems that are shared by two or more independent organizations. B) The solutions to problems in an enterprise system usually involve more than one department. C) Typically enterprise information systems support 10 to 100 users. D) Enterprise information systems that support a particular business function are called functional information systems. Answer: B Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) ________ are information systems that are shared by two or more independent organizations. A) Inter-enterprise information systems B) Workgroup information systems C) Enterprise information systems D) Personal information systems Answer: A Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 9) ________ is an example of an inter-enterprise information system. A) Scheduling of groundskeeping B) Contact manager C) Ordering of restaurant supplies from suppliers D) Charging of membership fees Answer: C Page Ref: 166 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
3 Copyright © 2014 Pearson Education, Inc.
10) ________ occurs when data are isolated in separated information systems. A) Walled garden B) Information silo C) Scheduling D) System integration Answer: B Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 11) Information silos arise as a result of ________. A) the individual users of personal information systems B) an inter-enterprise information system's involvement to find solutions to problems arising within two or more enterprises C) an organization's plan to create them D) data being isolated in separated systems Answer: D Page Ref: 166 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 12) Which of the following applications falls under the common departmental information system of sales and marketing? A) order tracking B) general ledger C) lead generation D) assessment Answer: C Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
4 Copyright © 2014 Pearson Education, Inc.
13) As a common departmental information system, ________ includes order management. A) accounting B) operations C) human resources D) manufacturing Answer: B Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 14) Planning and scheduling are applications that fall under ________. A) manufacturing B) sales and management C) accounting D) customer service Answer: A Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 15) Order tracking and account tracking are applications of ________. A) operations B) manufacturing C) sales and marketing D) customer service Answer: D Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 16) ________ is an application of the human resources department. A) Compensation B) Planning C) Financial reporting D) Lead tracking Answer: A Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS) 5 Copyright © 2014 Pearson Education, Inc.
17) Which of the following is a consequence of isolated information systems? A) Data cannot get duplicated. B) Business processes are coherent and efficient. C) Decisions are made in unison with other systems. D) There is a lack of integrated enterprise information. Answer: D Page Ref: 168 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 18) The summation of all the problems of information silos leads to ________. A) diseconomies of scope B) increased costs for the organization C) diminishing marginal returns D) reduced organizational innovation Answer: B Page Ref: 169 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 19) ________ is the activity of altering and designing business processes to take advantage of new information systems. A) Business process management B) Business process reengineering C) Business process improvement D) Business process interoperability Answer: B Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
6 Copyright © 2014 Pearson Education, Inc.
20) Which of the following is true for business process reengineering? A) Business process reengineering is efficient, fast, and economical. B) Business process reengineering, when combined with ERP, has a 100 percent success rate. C) Systems analysts need to interview key personnel throughout the organization to determine how best to use the new technology. D) Due to its streamlined process, business process reengineering requires very little time and expertise. Answer: C Page Ref: 171 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 21) Inherent processes are ________. A) time-consuming business processes and involve substantial investment B) predesigned procedures for using the software products C) the activities which alter and design business processes to take advantage of new information systems D) always accompanied by business process reengineering Answer: B Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 22) Which of the following is true for inherent processes? A) Inherent processes are almost always a perfect fit. B) Organizations cannot license the software that is used in various inherent processes. C) Inherent processes are an expensive and time-consuming practise. D) Inherent processes help avoid business process reengineering. Answer: D Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
7 Copyright © 2014 Pearson Education, Inc.
23) A customer relationship management system is ________. A) a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service B) a Web application that allows businesses to manage customer suggestions and complaints in a structured fashion C) a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform D) a suite of software applications that integrates existing systems by providing layers of software that connect applications together Answer: A Page Ref: 171-172 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 24) The first step of the customer life cycle is marketing which involves ________. A) sending messages to the target audience to attract customer prospects B) attempting to win back high value customers C) converting prospects into customers who need to be supported D) increasing the value of existing customers Answer: A Page Ref: 172 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 25) When prospects become customers who need to be supported, the organization is in the ________ stage of the customer life cycle. A) loss B) marketing C) customer acquisition D) relationship management Answer: C Page Ref: 172 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
8 Copyright © 2014 Pearson Education, Inc.
26) Which of the following is a component of relationship management? A) converting prospects into customers who need to be supported B) increasing the value of existing customers by selling them more product C) losing customers D) sending messages to the target audience to attract customer prospects Answer: B Page Ref: 172 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 27) During which stage of the customer life cycle do win-back processes categorize customers according to value? A) customer acquisition B) marketing C) relationship management D) loss Answer: D Page Ref: 172 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 28) ________ is the last stage of the customer life cycle. A) Marketing B) Customer acquisition C) Loss D) Relationship management Answer: C Page Ref: 172 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 29) Which of the following sentences is true about customer relationship management system (CRM)? A) CRM is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. B) CRM systems vary in the degree of functionality they provide. C) CRM incorporates accounting, manufacturing, inventory, and human resources applications. D) CRM systems are designed to avoid being customer-centric. Answer: B Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 9 Copyright © 2014 Pearson Education, Inc.
30) Enterprise resource planning is ________. A) a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform B) a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service C) a suite of software applications that integrates existing systems by providing layers of software that connect applications together D) a Web application that allows businesses to manage customer suggestions and complaints in a structured fashion Answer: A Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 31) Which of the following is true about enterprise resource planning (ERP)? A) ERP is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. B) ERP, though unable to incorporate functions of CRM, includes accounting, manufacturing, inventory, and human resources applications. C) The layers of ERP software enable existing applications to communicate with each other and to share data. D) ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. Answer: D Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 32) ________ is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. A) ERP B) EAI C) CRM D) SAP Answer: B Page Ref: 175 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
10 Copyright © 2014 Pearson Education, Inc.
33) Which of the following is a function of EAI? A) It is used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. B) It posts activities in the general ledger and other accounting applications. C) It consolidates business operations into a single, consistent, computing platform. D) It enables a gradual move to ERP. Answer: D Page Ref: 175 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 34) Which of the following statements is true of EAI? A) The process of converting from a current system to an EAI system is a daunting task. B) The layers of EAI software prevent existing applications from communicating with each other. C) EAI makes use of a centralized database. D) EAI leverages existing systems—leaving functional applications as is, but providing an integration layer over the top. Answer: D Page Ref: 175 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 35) When implementing new enterprise systems, the only solution for resolving process issues and providing enterprise process management is ________. A) communicating the need for the change to the employees B) developing committees and steering groups C) establishing clear and absolute contractual guidelines D) reinforcing employees' sense of self-efficacy Answer: B Page Ref: 176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
36) ________ is a major task when implementing enterprise systems. A) Process blueprinting B) Encapsulation C) Module development D) Gap identification Answer: D Page Ref: 176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 37) Which of the following is true about the challenges of requirements gaps? A) To specify a gap, an organization must know both what it needs and what the new product does. B) The first challenge is to find a licensed enterprise product that is a perfect fit for the organization. C) While identifying the gaps is easy, deciding what to do with them is a major challenge. D) While resolving gaps, changing the way an organization adapts to a new application is easier than altering an application to match what the organization does. Answer: A Page Ref: 176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 38) ________ is a person's belief that he or she can be successful at his or her job. A) Hope B) Arrogance C) Faith D) Self-efficacy Answer: D Page Ref: 177 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
12 Copyright © 2014 Pearson Education, Inc.
True or False 1) A workgroup information system is an information system that is shared by a group of people for a particular purpose. Answer: TRUE Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 2) Workgroup information systems that support a particular department are sometimes called functional information systems. Answer: FALSE Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 3) Scheduling of groundskeeping is an example of a personal information system. Answer: FALSE Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 4) The accounts payable system that is used by the accounts payable department is an example of departmental information systems. Answer: TRUE Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 5) The existence of information silos helps resolve any problems that may arise due to isolated information systems. Answer: FALSE Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 13 Copyright © 2014 Pearson Education, Inc.
6) Enterprise information systems are information systems that span an organization and support activities of people in multiple departments. Answer: TRUE Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 7) The solutions to problems in an enterprise system usually involve more than one enterprise. Answer: FALSE Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) Inter-enterprise information systems are information systems that are shared by two or more independent departments. Answer: FALSE Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 9) Information silos arise as a consequence of an organization's growth and increasing use of information systems and do not pose any serious threat. Answer: FALSE Page Ref: 166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 10) When an organization has inconsistent duplicated data, it is said to have a data integrity problem. Answer: TRUE Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 14 Copyright © 2014 Pearson Education, Inc.
11) Information systems for both manufacturing and operations departments of an organization will process data related to finished goods and can therefore cause duplication and lead to problems. Answer: TRUE Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 12) Contrary to popular belief, isolation of departmental applications cannot be held responsible for disjointed business processes. Answer: FALSE Page Ref: 167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 13) Information silos can result in increased cost for an organization. Answer: TRUE Page Ref: 169 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 14) Business process management is the activity of altering and designing business processes to take advantage of new information systems. Answer: FALSE Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 15) Business process reengineering is efficient and economical. Answer: FALSE Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 15 Copyright © 2014 Pearson Education, Inc.
16) Inherent processes are predesigned procedures for using software products, saving organizations from expensive and time-consuming business process reengineering. Answer: TRUE Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 17) An enterprise resource planning system is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Answer: FALSE Page Ref: 171-172 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 18) The first step of the customer life cycle is marketing. Answer: TRUE Page Ref: 172 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 19) Elimination of duplicated data helps solve the issue of information silos. Answer: TRUE Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 20) Enterprise resource planning (ERP) is used to consolidate business operations into a single, consistent, computing platform. Answer: TRUE Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
16 Copyright © 2014 Pearson Education, Inc.
21) Connecting system "islands" via a new layer of software/system is the function of enterprise application integration. Answer: TRUE Page Ref: 175 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 22) Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss. Answer: TRUE Page Ref: 176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 23) Many organizations create their own enterprise systems from scratch. Answer: FALSE Page Ref: 176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 24) Transitioning from one system to a new enterprise system is fairly easy due to the integrated steps involved. Answer: FALSE Page Ref: 177 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 25) Self-efficacies are a person's belief that he or she can be successful at his or her job. Answer: TRUE Page Ref: 177 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
17 Copyright © 2014 Pearson Education, Inc.
26) One of the reasons why people fear change is because it threatens their self-efficacies. Answer: TRUE Page Ref: 177 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases Essay 1) What are personal information systems? Answer: Personal information systems are information systems used by a single individual. The contact manager in an iPhone or in an email account is an example of a personal information system. Because such systems have only one user, procedures are simple and probably not documented or formalized in any way. It is easy to manage change to personal information systems. Because there is a sole user of the new system, if new procedures are required, only one person needs to adapt. And, if there are problems, he/she can solve the problems themselves. Page Ref: 165 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 2) Explain workgroup information systems. Answer: A workgroup information system is an information system that is shared by a group of people for a particular purpose. For example, the personnel who maintain golf courses, club lawns, and gardens share a workgroup information system for scheduling tasks and employees to accomplish those tasks. Workgroup information systems that support a particular department are sometimes called departmental information systems. An example is the accounts payable system that is used by the accounts payable department. Other workgroup information systems support a particular business function and are called functional information systems. An example of a functional system is a Web storefront. Typically workgroup systems support 10 to 100 users. The procedures for using them must be understood by all members of the group. Often, procedures are formalized in documentation, and users are sometimes trained in the use of those procedures. When problems occur, they almost always can be solved within the group. Page Ref: 165-166 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
18 Copyright © 2014 Pearson Education, Inc.
3) What are enterprise information systems? Answer: Enterprise information systems are information systems that span an organization and support activities in multiple departments. For example, at a country club resort, the restaurant, the golf courses, and the wedding events departments all use the same enterprise information system to record sales. Enterprise information systems typically have hundreds to thousands of users. Procedures are formalized and extensively documented; users undergo formal procedure training. Sometimes enterprise systems include categories of procedures, and users are defined according to levels of expertise with the system as well as by levels of security authorization. The solutions to problems in an enterprise system usually involve more than one department. Because enterprise systems span many departments and involve potentially thousands of users, they are very difficult to change. Changes must be carefully planned, cautiously implemented, and users given considerable training. Sometimes users are given incentives and other inducements to motivate them to change. Page Ref: 166 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 4) Explain inter-enterprise information systems. Answer: Inter-enterprise information systems are information systems that are shared by two or more independent organizations. At a club house, for example, the information system that a restaurant uses to order supplies and ingredients from its suppliers is an interorganizational system. Because such systems are used by employees of different organizations, procedures are formalized and user training is mandatory. Such systems typically involve thousands of users, and solutions to problems require cooperation among different, usually independently owned, organizations. Problems are resolved by meeting, contract, and sometimes by litigation. Data are often duplicated between organizations, but such duplication is carefully managed. Because of the wide span, complexity, and multiple companies involved, such systems can be exceedingly difficult to change. The interaction of independently owned and operated information systems is required. Page Ref: 166 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
19 Copyright © 2014 Pearson Education, Inc.
5) What are information silos? Answer: Information silos are the conditions that exist when data are isolated in separated information systems. Silos come into existence as entities at one organizational level create information systems that meet their particular needs only. Information silos are created over time, as information systems are implemented to support personal and workgroup applications. As organizations grow, however, at some point such silos will duplicate data and become a source of potentially serious problems. Page Ref: 166-167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 6) What are common departmental applications? Answer: Common departmental applications are systems created to support a given department's information processing needs. They work fine for those departments. For example, the sales and accounting department of a company handles applications like lead generation and sales forecasting and the manufacturing department of an organization handles applications like inventory, planning, scheduling, etc. However, functional applications duplicate large amounts of data and are likely to cause problems. Page Ref: 166-167 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the components of an information system (IS)
20 Copyright © 2014 Pearson Education, Inc.
7) What problems do information silos cause? Answer: As organizations grow, information silos will eventually duplicate data and become a source of potentially serious problems. First, data are duplicated because each application has its own database. If, for example, accounting and sales/marketing applications are separated, customer data will be duplicated and may become inconsistent. Changes to customer data made in the sales/marketing application may take days or weeks to reach the accounting application's database. During that period, shipments will reach the customer without delay, but invoices will be sent to the wrong address. Next, when applications are isolated, business processes are disjointed. A consequence of such disjointed systems is the lack of integrated enterprise information. For example, suppose sales and marketing wants to know if XYZ is still a preferred customer. Suppose that determining whether this is so requires a comparison of order history and payment history data. However, with information silos, that data will reside in two different databases and, in one of them, XYZ is known by the name of the company that acquired it. Data integration will be difficult. Making the determination will require manual processes and days, when it should be readily answered in seconds. This leads to the fourth consequence: inefficiency. When using isolated functional applications, decisions are made in isolation. Without integration, the left hand of the organization doesn't know what the right hand of the organization is doing. Finally, information silos can result in increased cost for the organization. Duplicated data, disjointed systems, limited information, and inefficiencies all mean higher costs. Page Ref: 167-169 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) What are the ways of eliminating duplicate data? Answer: The fundamental problem of information silos is data that are duplicated and stored in isolated systems. The most obvious fix is to eliminate that duplicated data by storing a single copy of data in a shared database and revising business processes (and applications) to use that database. For this, a database should be created. Then each department should alter its business processes (and applications) to use the shared database. Another remedy is to allow the duplication, but to manage it to avoid problems. Page Ref: 169 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
21 Copyright © 2014 Pearson Education, Inc.
9) What is business process reengineering? Answer: Business process reengineering is the activity of altering and designing business processes to take advantage of new information systems. Unfortunately, business process reengineering is difficult, slow, and exceedingly expensive. Systems analysts need to interview key personnel throughout the organization to determine how best to use the new technology. Because of the complexity involved, such projects require high-level and expensive skills and considerable time. Many early projects stalled when the enormity of the project became apparent. This left some organizations with partially implemented systems that had disastrous consequences. Personnel didn't know if they were using the new system, the old system, or some hacked-up version of both. Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) What are inherent processes? Answer: Inherent processes are predesigned procedures for using software products. They save organizations from expensive and time-consuming business process reengineering. Organizations could license the software and obtain, as part of the deal, prebuilt procedures. There are three categories of such inherent processes: customer relationship management; enterprise resource planning, and enterprise application integration. Page Ref: 171 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 11) Write a short note on customer relationship management systems (CRM). Answer: A customer relationship management system (CRM) is a suite of applications, a database, and a set of inherent processes for managing all the interactions with the customer, from lead generation to customer service. Every contact and transaction with the customer is recorded in the CRM database. Vendors of CRM software claim using their products makes the organization customer-centric. Though that term reeks of sales hyperbole, it does indicate the nature and intent of CRM packages. Page Ref: 171-172 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
22 Copyright © 2014 Pearson Education, Inc.
12) Explain the four phases of the customer life cycle. Answer: The four phases of the customer life cycle are marketing, customer acquisition, relationship management, and loss/churn. Marketing sends messages to the target market to attract customer prospects. When prospects order, they become customers who need to be supported. Additionally, relationship management processes increase the value of existing customers by selling them more product. Inevitably, over time the organization loses customers. When this occurs, win-back processes categorize customers according to value and attempt to win back high-value customers. Page Ref: 172 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 13) What is ERP? Answer: Enterprise resource planning (ERP) is a suite of applications, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. ERP includes the functions of CRM and also incorporates accounting, manufacturing, inventory, and human resources applications. ERP systems are used to forecast sales and to create manufacturing plans and schedules to meet those forecasts. Manufacturing schedules include the use of material, equipment, and personnel and thus need to incorporate inventory and human resources applications. Because ERP includes accounting, all of these activities are automatically posted in the general ledger and other accounting applications. Page Ref: 174 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
23 Copyright © 2014 Pearson Education, Inc.
14) Describe enterprise application integration. Answer: Companies for which enterprise resource planning is inappropriate still have the problems of information silos, however, and some choose to use enterprise application integration (EAI) to solve those problems. EAI is a suite of software applications that integrates existing systems by providing layers of software that connect applications together. Although there is no centralized EAI database, the EAI software keeps files of metadata that describe where data are located. Users can access the EAI system to find the data they need. In some cases, the EAI system provides services that provide a "virtual integrated database" for the user to process. The major benefit of EAI is that it enables organizations to use existing applications while eliminating many of the serious problems of isolated systems. Converting to an EAI system is not nearly as disruptive as converting to ERP, and it provides many of the benefits of ERP. Some organizations develop EAI applications as a steppingstone to complete ERP systems. Page Ref: 175-176 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS)
24 Copyright © 2014 Pearson Education, Inc.
15) What are the challenges that occur when implementing new enterprise systems? Answer: Implementing new enterprise systems is challenging, difficult, expensive, and risky. It is not unusual for enterprise system projects to be well over budget and a year or more late in delivery. The expense and risks arise from four primary factors: collaborative management, requirements gaps, transition problems, and employee resistance. Unlike departmental systems in which a single department manager is in charge, enterprise systems have no clear boss. Even the discharge process is a collaborative effort among many departments (and customers). Hence, the enterprise should develop committees and steering groups for providing enterprise process management. Although this can be an effective solution, and in fact may be the only solution, the work of such groups is both slow and expensive. Few organizations today create their own enterprise systems from scratch. Instead, they license an enterprise product that provides specific functions and features and that includes inherent procedures. But, such licensed products are never a perfect fit. Almost always there are gaps between the requirements of the organization and the capabilities of the licensed application. Identifying these gaps and deciding what to do with these gaps can be very challenging. Transitioning to a new enterprise system is also difficult. The organization must somehow change from using isolated departmental systems to using the new enterprise system, while continuing to run the business. Transitions require careful planning and substantial training. Inevitably, problems will develop. Knowing this will occur, senior management needs to communicate the need for the change to the employees and then stand behind the new system as the kinks are worked out. It is an incredibly stressful time for all involved employees. People resist change for various reasons. Change requires effort and it engenders fear. Hence, senior-level management needs to communicate the need for the change to the organization and must reiterate that, as necessary, throughout the transition process. To enhance confidence, employees need to be trained and coached on the successful use of the new system. Also, employees may need to be given extra inducement to change to the new system. Implementing new enterprise systems can solve many problems and bring great efficiency and cost savings to an organization, but it is not for the faint of heart. Page Ref: 176-177 Difficulty: Hard AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
25 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 8: Social Media Information Systems Multiple Choice 1) ________ is the use of information technology to support the sharing of content among networks of users. A) Electronic data interchange B) Data warehousing C) Cloud computing D) Social media Answer: D Page Ref: 193 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 2) Social media ________ are companies and other organizations that choose to support a presence on one or more SM sites. A) outlets B) sponsors C) application providers D) sectors Answer: B Page Ref: 195 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 3) Social media ________ are the companies that operate the SM sites. A) outlets B) sponsors C) application providers D) sectors Answer: C Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 1 Copyright © 2014 Pearson Education, Inc.
4) Social media ________ create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. A) application providers B) collaborators C) sectors D) outlets Answer: A Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) ________ data is data and responses to data that are contributed by users and SM sponsors. A) Connection B) Capital C) Content D) Custom Answer: C Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 6) ________ data is data about relationships. A) Connection B) Capital C) Content D) Custom Answer: A Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
2 Copyright © 2014 Pearson Education, Inc.
7) With respect to the five components of SMIS, which of the following is true of community users? A) They process SM sites using elastic, cloud-based servers. B) They develop and operate their own custom social networking application software to read and submit data. C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. D) Their procedures are informal, evolving, and socially oriented. Answer: D Page Ref: 197 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 8) With respect to the five components of SMIS, which of the following is true of application providers? A) They process SM sites using desktops, laptops, and smartphones. B) They store and retrieve SM data on behalf of sponsors and user communities. C) They employ browsers and native mobile applications to read and submit data. D) Their procedures are informal, evolving, and socially oriented. Answer: B Page Ref: 197 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 9) With respect to the five components of SMIS, which of the following is true of SM sponsors? A) They process SM sites using elastic, cloud-based servers. B) They employ browsers and native mobile applications to read and submit data. C) They need to be trained on both SMIS user procedures as well as on the organization's social networking policy. D) Their procedures are informal, evolving, and socially oriented. Answer: C Page Ref: 198 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following is true of defenders of belief? A) They seek conformity and want to convince others of the wisdom of their belief. B) Their communities do not facilitate activities like sales and marketing. C) They are effective for activities that involve innovation and problem solving. D) When confronted with contrary evidence, they change their opinion. Answer: A Page Ref: 198 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 11) ________ is the dynamic social media process of employing users to participate in product design or product redesign. A) Social capitalization B) User interface designing C) Crowdsourcing D) Process reengineering Answer: C Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 12) ________ is the application of social media to facilitate the cooperative work of people inside organizations. A) Enterprise architecture B) Enterprise resource planning C) Enterprise 2.0 D) Enterprise application integration Answer: C Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
4 Copyright © 2014 Pearson Education, Inc.
13) A ________ is a content structure that has emerged from the processing of many user tags. A) metalanguage B) chrome C) folksonomy D) bookmark Answer: C Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 14) According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of ________. A) signaling B) authoring C) tagging D) searching Answer: B Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 15) According to McAfee, Enterprise 2.0 workers want applications that enable them to rate tagged content and to use the tags to predict content that will be of interest to them. Which of the following characteristics of Enterprise 2.0 does this refer to? A) search B) authoring C) signals D) extensions Answer: D Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
5 Copyright © 2014 Pearson Education, Inc.
16) According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of ________. A) signaling B) authoring C) tagging D) searching Answer: A Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 17) Being linked to a network of highly regarded contacts is a form of ________. A) social credential B) personal reinforcement C) mobility D) influence Answer: A Page Ref: 203 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 18) Which of the following is true of social capital? A) Social capital is the investment in human knowledge and skills for future profit. B) The value of social capital is determined by the number of the relationships in a social network. C) Social capital can be gained by limiting the number of friends. D) Being linked into social networks undermines a professional's image and position in an organization. Answer: B Page Ref: 203 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes
6 Copyright © 2014 Pearson Education, Inc.
19) A(n) ________ is a statement that delineates employees' rights and responsibilities. A) statement of purpose B) employee relations policy C) social media policy D) corporate datasheet Answer: C Page Ref: 207 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 20) Which of the following is true of social networking problems? A) Responses are best reserved for when the problematic content has caused the organization to do something positive as a result. B) Inappropriate contributions that contain obscene or otherwise inappropriate content should be ignored indefinitely. C) It is unnecessary to communicate the criticism to the product development team. D) If the problematic content represents reasonable criticism of the organization's products, the best response is to delete it. Answer: A Page Ref: 209 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 21) In the context of management, ________ means loss of control of employees. A) transcendence B) divergence C) emergence D) dependence Answer: C Page Ref: 210 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance
7 Copyright © 2014 Pearson Education, Inc.
True or False 1) Electronic data interchange is the use of information technology to support the sharing of content among networks of users. Answer: FALSE Page Ref: 193 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 2) Social media enables people to form hives, which refer to groups of people related by a common interest. Answer: TRUE Page Ref: 193 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world 3) A social media information system is an information system that supports the sharing of content among networks of users. Answer: TRUE Page Ref: 193 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 4) Social media outlets are companies and other organizations that choose to support a presence on one or more SM sites. Answer: FALSE Page Ref: 195 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) Social media sponsors are the companies that operate the SM sites. Answer: FALSE Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 8 Copyright © 2014 Pearson Education, Inc.
6) Google is an example of a social media application provider. Answer: TRUE Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 7) Social media application providers create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. Answer: TRUE Page Ref: 196 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 8) It is not possible for a social media sponsor to develop its own provider. Answer: FALSE Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 9) Both community users and employees of SM sponsors process SM sites using elastic, cloudbased servers. Answer: FALSE Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 10) SM sponsors employ browsers and native mobile applications to read and submit data. Answer: FALSE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
9 Copyright © 2014 Pearson Education, Inc.
11) SM application providers develop and operate their own custom, proprietary, social networking application software. Answer: TRUE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 12) Content data is data about relationships. Answer: FALSE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 13) Connection data differentiates SMIS from Web site applications. Answer: TRUE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 14) Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data. Answer: TRUE Page Ref: 197 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 15) SM application providers store and retrieve SM data on behalf of sponsors and user communities. Answer: TRUE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 16) For SM sponsors, social networking procedures are informal, evolving, and socially oriented. Answer: FALSE Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 10 Copyright © 2014 Pearson Education, Inc.
17) SM sponsors do what they want to do depending on their goals and their personalities. Answer: FALSE Page Ref: 198 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 18) Employees who contribute to and manage social networking sites will generate direct labor costs. Answer: TRUE Page Ref: 198 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 19) When confronted with contrary evidence, defenders of belief change their opinion. Answer: FALSE Page Ref: 198 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 20) Defenders-of-belief communities facilitate activities like sales and marketing. Answer: TRUE Page Ref: 198-199 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 21) Defenders-of-belief communities are effective for activities that involve innovation or problem solving. Answer: FALSE Page Ref: 199 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 22) Seekers of the truth share a common desire to learn something, solve a problem, or make something happen. Answer: TRUE Page Ref: 199 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2
11 Copyright © 2014 Pearson Education, Inc.
23) In social CRM, relationships between organizations and customers are predefined. Answer: FALSE Page Ref: 199 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 24) Since the relationships between organizations and customers emerge from joint activity, customers have as much control as companies. Answer: TRUE Page Ref: 200 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 25) Seekers-of-the-truth communities cannot provide solutions to complex supply chain problems. Answer: FALSE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 26) Crowdsourcing is the dynamic social media process of employing users to participate in product design or product redesign. Answer: TRUE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 27) Enterprise resource planning is the application of social media to facilitate the cooperative work of people inside organizations. Answer: FALSE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
12 Copyright © 2014 Pearson Education, Inc.
28) According to McAfee, Enterprise 2.0 workers want to be able to navigate content structures such as lists and tables of content. Answer: FALSE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 29) According to McAfee's Enterprise 2.0 model, creating enterprise content via blogs, wikis, discussion groups, and presentations is part of authoring. Answer: TRUE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 30) Enterprise 2.0 content is tagged differently from the content on the Web. Answer: FALSE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 31) A folksonomy is content structure that has emerged from the processing of many user tags. Answer: TRUE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 32) According to McAfee's Enterprise 2.0 model, the process in which workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them is called extensions. Answer: TRUE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 33) According to McAfee's Enterprise 2.0 model, pushing enterprise content to users based on subscriptions and alerts is part of tagging. Answer: FALSE Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 13 Copyright © 2014 Pearson Education, Inc.
34) Since the benefits of Enterprise 2.0 result from emergence, there is no way to control for either effectiveness or efficiency. Answer: TRUE Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 35) Capital is defined as the investment of resources for future profit. Answer: TRUE Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 36) Social capital is the investment in human knowledge and skills for future profit. Answer: FALSE Page Ref: 202 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 37) Being linked to a network of highly regarded contacts is a form of social credential. Answer: TRUE Page Ref: 203 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 38) The value of social capital is determined by the number of relationships in a social network, by the strength of those relationships, and by the resources controlled by those related. Answer: TRUE Page Ref: 203 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 39) Social capital can be gained by limiting the number of friends. Answer: FALSE Page Ref: 203 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3
14 Copyright © 2014 Pearson Education, Inc.
40) The strength of a relationship is the likelihood that the entity in the relationship will do something that benefits the organization. Answer: TRUE Page Ref: 206 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 41) A social media policy is a statement that delineates employees' rights and responsibilities. Answer: TRUE Page Ref: 207 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 42) If a reasoned, nondefensive response generates continued and unreasonable user-generated content from that same source, it is best for the organization to delete it. Answer: FALSE Page Ref: 209 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 43) In the context of CRM, social media means that the vendor loses control of the customer relationship. Answer: TRUE Page Ref: 210 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 44) In the context of management, transcendence means loss of control of employees. Answer: FALSE Page Ref: 210 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5
15 Copyright © 2014 Pearson Education, Inc.
Essay 1) What is social media? Answer: Social media (SM) is the use of information technology to support the sharing of content among networks of users. Social media enables people to form communities, tribes, or hives, all of which are synonyms that refer to a group of people related by a common interest. A social media information system (SMIS) is an information system that supports the sharing of content among networks of users. Page Ref: 193 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) What are social media sponsors? Answer: Social media sponsors are companies and other organizations that choose to support a presence on one or more SM sites. For example, when Microsoft places icons on its promotional pages, it is making a commitment to invest considerable employee time and other costs to support social media. It needs to develop procedures and staff, and train people to support that site. Page Ref: 195 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 3) What are social media application providers? Answer: Social media application providers are the companies that operate the SM sites. Facebook, Twitter, LinkedIn, and Google are all SM application providers. These providers create the features and functions of the site, and they compete with one another for the attention of user communities and SM sponsors. Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 4) Explain the hardware component of SMIS with respect to each of the three organizational roles. Answer: Both community users and employees of SM sponsors process SM sites using desktops, laptops, smartphones, iPads, HTML 5 devices, and, indeed, any intelligent communications device. In most cases, SM application providers host the SM presence using elastic servers in the cloud. Page Ref: 196 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 16 Copyright © 2014 Pearson Education, Inc.
5) Explain the software component of SMIS with respect to each of the three organizational roles. Answer: Users employ browsers and native mobile applications, such as iOS applications, to read and submit data and to add and remove connections to communities and other users. SM sponsors contribute to the site via browsers or using specialized sponsor applications provided by the SM application provider. In some cases, like, say, Facebook applications, SM sponsors create their own applications and interface those applications with the SM site. SM application providers develop and operate their own custom, proprietary, social networking application software. SM application vendors must do so because the features and functions of their applications are fundamental to their competitive strategy. Page Ref: 197 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 6) Explain the data component of SMIS with respect to each of the three organizational roles. Answer: SM data falls into two categories: content and connection. Content data is data and responses to data that are contributed by users and SM sponsors. Connection data is data about relationships. Connection data differentiates SMIS from Web site applications. Both Web sites and social networking sites present user and responder content, but only social networking applications store and process connection data. SM application providers store and retrieve SM data on behalf of sponsors and user communities. Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 7) Explain the procedure component of SMIS with respect to each of the three organizational roles. Answer: For social networking users, procedures are informal, evolving, and socially oriented. You do what your friends do. Such informality makes using SMIS easy; it also means that unintended consequences are common. The most troubling examples concern user privacy. For SM sponsors, social networking procedures cannot be so informal. Before initiating a social networking presence, organizations must develop procedures for creating content, managing user responses, removing obsolete or objectionable content, and extracting value from content. Procedures for operating and maintaining the SM application are beyond the scope of the text. Page Ref: 197 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
17 Copyright © 2014 Pearson Education, Inc.
8) Explain the people component of SMIS with respect to each of the three organizational roles. Answer: Users of social media do what they want to do depending on their goals and their personalities. They behave in certain ways and observe the consequences. SM sponsors, however, cannot be casual. Anyone who contributes to an organization's SM site or who uses his or her position in a company to speak for an organization needs to be trained on both SMIS user procedures as well as on the organization's social networking policy. The staff to operate and maintain the SM application is beyond the scope of the text. Page Ref: 198 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 9) What are defenders-of-belief communities? Answer: Defenders of belief share a common belief and form their hive around that belief. They seek conformity and want to convince others of the wisdom of their belief. When confronted with contrary evidence, they do not change their opinion, but become more firmly convinced in their belief. Defenders-of-belief communities facilitate activities like sales and marketing. They are not effective for activities that involve innovation or problem solving. Such groups can form strong bonds and allegiance to an organization. Page Ref: 198-199 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 10) What are seekers-of-the-truth communities? Answer: Seekers of the truth share a common desire to learn something, solve a problem, or make something happen. They share a common problem, but not a common solution to that problem. Not surprisingly, such tribes are incredible problem solvers and excel at innovation. They can be useful in customer service activity, as long as they don't conclude that the best way to solve a product problem is to use another company's product, something they might do because such groups seldom form a strong bond to an organization. The only organizational bond seekers of the truth are likely to form occurs when the organization demonstrates behavior that demonstrates that it, too, is committed to solving the community's shared problem. Page Ref: 199 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2
18 Copyright © 2014 Pearson Education, Inc.
11) What is social CRM? Answer: Social CRM is a dynamic, SM-based CRM process. The relationships between organizations and customers emerge in a dynamic process as both parties create and process content. In addition to the traditional forms of promotion, employees in the organization create wikis, blogs, discussion lists, FAQs, sites for user reviews and commentary, and other dynamic content. Customers search this content, contribute reviews and commentary, ask more questions, create user groups, and so forth. With social CRM, each customer crafts his or her own relationship with the company. Page Ref: 199-200 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 12) What is the difference between traditional CRM and social CRM? Answer: In social CRM, because relationships emerge from joint activity, customers have as much control as companies. This characteristic is anathema to traditional sales managers who want control over what the customer is reading, seeing, and hearing about the company and its products. Further, traditional CRM is centered on lifetime value; customers who are likely to generate the most business get the most attention and have the most impact on the organization. But, with social CRM, the customer who spends 10 cents but who is an effective reviewer, commentator, or blogger can have more influence than the quiet customers who purchases $10 million a year. Such imbalance is incomprehensible to traditional sales managers. Page Ref: 200 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 13) What are the six characteristics of Enterprise 2.0? Answer: McAfee defined six characteristics of Enterprise 2.0, which he refers to by the acronym SLATES. Workers want to be able to search for content inside the organization just as they do on the Web. Most workers find that searching is more effective than navigating content structures such as lists and tables of contents. Workers want to access organizational content by link, just as they do on the Web. They also want to author organizational content using blogs, wikis, discussion groups, published presentations, and so forth. Enterprise 2.0 content is tagged, just like content on the Web, and tags are organized into structures. Additionally, Enterprise 2.0 workers want applications to enable them to rate tagged content and to use the tags to predict content that will be of interest to them, a process McAfee refers to as extensions. Finally, Enterprise 2.0 workers want relevant content pushed to them; they want to be signaled when something of interest to them happens in organizational content. Page Ref: 201 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 19 Copyright © 2014 Pearson Education, Inc.
14) What is a folksonomy? Answer: Enterprise 2.0 content is tagged, just like content on the Web, and tags are organized into structures. These structures organize tags as a taxonomy does, but, unlike taxonomies, they are not preplanned; they emerge. A folksonomy is a content structure that has emerged from the processing of many user tags. Page Ref: 201 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 15) How does social capital add value? Answer: Relationships in social networks can provide information about opportunities, alternatives, problems, and other factors important to business professionals. They also provide an opportunity to influence decision makers in one's employer or in other organizations who are critical to your success. Such influence cuts across formal organizational structures, such as reporting relationships. Third, being linked to a network of highly regarded contacts is a form of social credential. Finally, being linked into social networks reinforces a professional's image and position in an organization or industry. Page Ref: 203 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 16) Explain the major sources of user-generated content problems. Answer: When a business participates in a social network or opens its site to UGC, it opens itself to misguided people who post junk unrelated to the site's purpose. Crackpots may also use the network or UGC site as a way of expressing passionately held views about unrelated topics, such as UFOs, government cover-ups, fantastic conspiracy theories, and so forth. Because of the possibility of such content, SM sponsors should regularly monitor the site and remove objectionable material immediately. Unfavorable reviews are another risk. Research indicates that customers are sophisticated enough to know that few, if any, products are perfect. Most customers want to know the disadvantages of a product before purchasing it so they can determine if those disadvantages are important for their application. Mutinous movements are an extension of bad reviews. Page Ref: 208-209 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4
20 Copyright © 2014 Pearson Education, Inc.
17) How do you respond to social networking problems? Answer: The first task in managing social networking risk is to know the sources of potential problems and to monitor sites for problematic content. Once such content is found, however, organizations must have a plan for creating the organization's response. Three possibilities are: 1. Leave it 2. Respond to it 3. Delete it If the problematic content represents reasonable criticism of the organization's products or services, the best response may be to leave it where it is. Such criticism indicates that the site is not just a shill for the organization, but contains legitimate user content. A second alternative is to respond to the problematic content. However, this alternative is dangerous. If the response could be construed, in any way, as patronizing or insulting to the content contributor, the response can enrage the community and generate a strong backlash. In most cases, responses are best reserved for when the problematic content has caused the organization to do something positive as a result. If a reasoned, nondefensive response generates continued and unreasonable UGC from that same source, it is best for the organization to do nothing. Deleting content should be reserved for contributions that are inappropriate because they are contributed by crackpots, because they have nothing to do with the site, or because they contain obscene or otherwise inappropriate content. However, deleting legitimate negative comments can result in a strong user backlash. Page Ref: 209 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
21 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 9: Business Intelligence Systems Multiple Choice 1) ________ systems are information systems that process operational and other data to analyze past performance, and to make predictions. A) Enterprise planning B) Data mining C) Business intelligence D) Internal communication Answer: C Page Ref: 223 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 2) Which of the following is true of business intelligence systems? A) The business intelligence application processes the data to produce business intelligence for use by knowledge workers. B) Business intelligence is not applicable during project management. C) The software component of a business intelligence system is called a business intelligence database. D) The organization's own operational databases cannot be the source data for a business intelligence system. Answer: A Page Ref: 223 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) Data ________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A) interpretation B) application C) retention D) acquisition Answer: D Page Ref: 224 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems
1 Copyright © 2014 Pearson Education, Inc.
4) Which of the following activities in the business intelligence process involves creating business intelligence? A) data acquisition B) business intelligence analysis C) results publishing D) problem solving Answer: B Page Ref: 224 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 5) Which of the following activities in the business intelligence process involves delivering business intelligence to the knowledge workers who need it? A) data acquisition B) business intelligence analysis C) results publishing D) problem solving Answer: C Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 6) ________ publishing delivers business intelligence to users without any request from the users. A) Push B) Pull C) Direct D) Indirect Answer: A Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems
2 Copyright © 2014 Pearson Education, Inc.
7) ________ publishing requires the user to request business intelligence results. A) Push B) Pull C) Direct D) Indirect Answer: B Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 8) A ________ is a facility for managing an organization's business intelligence data. A) database B) data system C) data warehouse D) data structure Answer: C Page Ref: 231 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 9) The facts about data, such as its source, format, assumptions, constraints, and the like are called ________. A) metadata B) data structures C) microdata D) data packets Answer: A Page Ref: 231 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
3 Copyright © 2014 Pearson Education, Inc.
10) Problematic data are termed ________. A) rough data B) clickstream data C) granular data D) dirty data Answer: D Page Ref: 232 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 11) Which of the following problems is particularly common for data that have been gathered over time? A) wrong granularity B) nonintegration C) inconsistency D) missing values Answer: C Page Ref: 232 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 12) ________ refers to the level of detail represented by the data. A) Abstraction B) Granularity C) Dimensionality D) Aggregation Answer: B Page Ref: 232 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following is true of data with granularity? A) Granularity refers to the level of detail represented by the data. B) If the granularity is too coarse, the data can be made finer by summing and combining. C) The granularity in clickstream data is too coarse. D) If the granularity is too coarse, the data can be separated into constituent parts. Answer: A Page Ref: 232 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 14) The more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Which of the following best explains this phenomenon? A) the free rider problem B) the curse of dimensionality C) the tragedy of the commons D) the zero-sum game Answer: B Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 15) A ________ is a data collection that addresses the needs of a particular department or functional area of the business. A) data mart B) data center C) data mine D) data warehouse Answer: A Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
5 Copyright © 2014 Pearson Education, Inc.
16) The purpose of a ________ is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by business intelligence tools. A) data harvester B) data center C) data aggregator D) data warehouse Answer: D Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 17) The users in the data mart obtain data that pertain to a particular business function from the ________. A) data harvester B) data center C) data aggregator D) data warehouse Answer: D Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 18) Which of the following is true of data warehouses? A) The data warehouse takes data from the data producers for distribution. B) It is economical to create, staff, and operate data warehouses. C) Users in the data warehouse obtain data that pertain to a particular business function from the data mart. D) People working with a data warehouse are experts in a given business function. Answer: A Page Ref: 233 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
6 Copyright © 2014 Pearson Education, Inc.
19) ________ is the process of sorting, grouping, summing, filtering, and formatting structured data. A) Knowledge management B) Data mining analysis C) Cloud computing D) Reporting analysis Answer: D Page Ref: 234 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 20) ________ data is data in the form of rows and columns. A) Granulated B) Structured C) Integrated D) Problematic Answer: B Page Ref: 234 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 21) The goal of ________ is to create information about past performance. A) data integration B) data mining analysis C) reporting D) BigData Answer: C Page Ref: 234 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
7 Copyright © 2014 Pearson Education, Inc.
22) ________ reports are reports produced when something out of predefined bounds occurs. A) Exception B) Static C) Dynamic D) Informal Answer: A Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 23) ________ is the application of statistical techniques to find patterns and relationships among data for classification and prediction. A) Data encryption B) Data warehousing C) Data mining D) Data integration Answer: C Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 24) ________ techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence and machine-learning. A) Data encryption B) Data warehousing C) Data mining D) Data integration Answer: C Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
8 Copyright © 2014 Pearson Education, Inc.
25) Which of the following is true of unsupervised data mining? A) Analysts apply data mining techniques to the data and observe the results. B) Analysts apply statistical techniques to data to estimate parameters of a model. C) Analysts use tools such as regression analysis. D) Data miners develop a model prior to the analysis. Answer: A Page Ref: 235 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 26) In ________, statistical techniques identify groups of entities that have similar characteristics. A) cluster analysis B) content indexing C) regression analysis D) cloud computing Answer: A Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 27) With ________ data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. A) sequential B) supervised C) nonsequential D) unsupervised Answer: B Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
9 Copyright © 2014 Pearson Education, Inc.
28) Regression analysis is used in ________. A) expert systems B) knowledge management systems C) data-mining systems D) reporting systems Answer: C Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 29) In ________, the impact of a set of variables on another variable is measured. A) cluster analysis B) context indexing C) cloud computing D) regression analysis Answer: D Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 30) Which of the following is true of BigData? A) BigData refers to data sets that are at least a petabyte in size. B) BigData has low velocity, meaning that it is generated slowly. C) BigData can be processed using traditional techniques. D) BigData analysis does not involve reporting and data mining techniques. Answer: A Page Ref: 236 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
10 Copyright © 2014 Pearson Education, Inc.
31) When the BigData collection is broken into pieces, and hundreds or thousands of independent processors search these pieces for something of interest, the process is referred to as the ________ phase. A) Crash B) Control C) Reduce D) Map Answer: D Page Ref: 236 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 32) The results generated by BigData processors are combined in what is referred to as the ________ phase. A) Process B) Control C) Reduce D) Construct Answer: C Page Ref: 236 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 33) For business intelligence results to have value, they must ________. A) publish the information to the right user at the right time B) discover patterns and relationships in data to predict future outcomes C) foster innovation and improve customer service D) encode, save, and process expert knowledge Answer: A Page Ref: 239 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems
11 Copyright © 2014 Pearson Education, Inc.
34) ________ reports are business intelligence documents that are fixed at the time of creation and do not change. A) Informal B) Extension C) Static D) Stable Answer: C Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 35) ________ reports are business intelligence documents that are updated at the time they are requested. A) Informal B) Extension C) Static D) Dynamic Answer: D Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 36) Which of the following is true of business intelligence publishing alternatives? A) Pull options vary between different server types, such as Web servers and business intelligence servers. B) Publishing dynamic business intelligence requires the publisher to set up database access when documents are consumed. C) For static content, the skill required to create a publishing application is high. D) For Web servers, the push options are manual. Answer: B Page Ref: 239 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems
12 Copyright © 2014 Pearson Education, Inc.
37) The ________ function of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users. A) controlling B) processing C) delivery D) management Answer: D Page Ref: 240 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems True or False 1) Business intelligence systems are information systems that process operational and other data to analyze past performance and to make predictions. Answer: TRUE Page Ref: 223 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 2) The software component of a business intelligence system is called a business intelligence database. Answer: FALSE Page Ref: 223 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) The source data for a business intelligence system can be the data that the organization purchases from data vendors. Answer: TRUE Page Ref: 223 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
13 Copyright © 2014 Pearson Education, Inc.
4) Business intelligence is not applicable during project management. Answer: FALSE Page Ref: 224 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 5) Data retention is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Answer: FALSE Page Ref: 224 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 6) Publish results is the process of delivering business intelligence to the knowledge workers who need it. Answer: TRUE Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 7) Pull publishing delivers business intelligence to users without any request from the users. Answer: FALSE Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 8) A data warehouse is a facility for managing an organization's business intelligence data. Answer: TRUE Page Ref: 231 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
14 Copyright © 2014 Pearson Education, Inc.
9) Data warehouses cannot purchase external data from outside resources. Answer: FALSE Page Ref: 231 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 10) The facts about data, such as its source, format, assumptions, constraints, and the like are called metadata. Answer: TRUE Page Ref: 231 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 11) Problematic data are termed dirty data. Answer: TRUE Page Ref: 232 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 12) Data granularity refers to the level of detail represented by the data. Answer: TRUE Page Ref: 232 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 13) The granularity in clickstream data is too coarse. Answer: FALSE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
15 Copyright © 2014 Pearson Education, Inc.
14) If the granularity is too coarse, the data can be separated into constituent parts. Answer: FALSE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 15) The curse of dimensionality states that the more attributes there are, the more difficult it is to build a model that fits the sample data, but that is more relevant as a predictor. Answer: FALSE Page Ref: 233 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 16) Data marts are data collections that address the needs of a particular department or functional area of the business. Answer: TRUE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 17) Data marts are usually larger than data warehouses. Answer: FALSE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 18) The people who work with a data warehouse are experts in a given business function. Answer: FALSE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
16 Copyright © 2014 Pearson Education, Inc.
19) Users in the data mart obtain data that pertain to a particular business function from the data warehouse. Answer: TRUE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 20) It is economical to create, staff, and operate data warehouses and data marts. Answer: FALSE Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 21) Data mining analyses are used to create information about past performance, whereas reporting analysis is used primarily for classifying and predicting. Answer: FALSE Page Ref: 234 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 22) Structured data is data in the form of rows and columns. Answer: TRUE Page Ref: 234 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 23) With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Answer: TRUE Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
17 Copyright © 2014 Pearson Education, Inc.
24) Regression analysis is used to identify groups of entities that have similar characteristics. Answer: FALSE Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 25) Cluster analysis measures the impact of a set of variables on another variable. Answer: FALSE Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 26) BigData refers to data sets that are at least a petabyte in size. Answer: TRUE Page Ref: 236 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 27) BigData has low velocity, meaning that it is generated slowly. Answer: FALSE Page Ref: 236 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 28) MapReduce is a technique for harnessing the power of thousands of computers working in parallel. Answer: TRUE Page Ref: 236 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
18 Copyright © 2014 Pearson Education, Inc.
29) BigData has volume, velocity, and variation characteristics that far exceed those of traditional reporting and data mining. Answer: TRUE Page Ref: 237 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 30) Static reports are business intelligence documents that are updated at the time they are requested. Answer: FALSE Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 31) A printed sales analysis is an example of a dynamic report. Answer: FALSE Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 32) For email or collaboration tools, the push option is manual. Answer: TRUE Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 33) For dynamic content, the skill required to create a publishing application is low. Answer: FALSE Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems
19 Copyright © 2014 Pearson Education, Inc.
34) The management function of business intelligence servers maintains metadata about the authorized allocation of business intelligence results to users. Answer: TRUE Page Ref: 240 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems Essay 1) What are business intelligence systems? Answer: Business intelligence (BI) systems are information systems that process operational and other data to analyze past performance, and to make predictions. The patterns, relationships, and trends identified by BI systems are called business intelligence. As information systems, BI systems have the five standard components: hardware, software, data, procedures, and people. The software component of a BI system is called a BI application. Page Ref: 223 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 2) What are the three primary activities in the business intelligence process? Answer: The three primary activities in the business intelligence process are: acquire data, perform analysis, and publish results. Data acquisition is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Business intelligence analysis is the process of creating business intelligence. The three fundamental categories of business intelligence analysis are reporting, data mining, and BigData. Publish results is the process of delivering business intelligence to the knowledge workers who need it. Page Ref: 224-225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems
20 Copyright © 2014 Pearson Education, Inc.
3) Differentiate between push publishing and pull publishing. Answer: Push publishing delivers business intelligence to users without any request from the users; the BI results are delivered according to a schedule or as a result of an event or particular data condition. Pull publishing requires the user to request BI results. Page Ref: 225 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 4) Explain the functions of a data warehouse. Answer: The functions of a data warehouse are to: 1. obtain data 2. cleanse data 3. organize and relate data 4. catalog data Programs read production and other data and extract, clean, and prepare that data for business intelligence processing. The prepared data are stored in a data warehouse database using a data warehouse DBMS, which can be different from the organization's operational DBMS. Data warehouses include data that are purchased from outside sources. Metadata concerning the data—its source, its format, its assumptions and constraints, and other facts about the data—is kept in a data warehouse metadata database. Page Ref: 224 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 5) What is data granularity? Answer: Data granularity refers to the level of detail represented by the data. Granularity can be too fine or too coarse. Generally, it is better to have too fine a granularity than too coarse. If the granularity is too fine, the data can be made coarser by summing and combining. If the granularity is too coarse, however, there is no way to separate the data into constituent parts. Page Ref: 232-233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
21 Copyright © 2014 Pearson Education, Inc.
6) What is clickstream data? Answer: Clickstream data is that data which is captured from customers' clicking behavior. These data are very fine and include everything a customer does at the Web site. Because the data are too fine, the data analysts must throw away millions and millions of clicks. Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 7) Explain the curse of dimensionality. Answer: The curse of dimensionality is associated with the problem of data having too many attributes. Suppose there are too many attributes from the internal customer data as well as the customer data that has been purchased. To be able to select among them, the curse of dimensionality says that the more attributes there are, the easier it is to build a model that fits the sample data, but that is worthless as a predictor. Page Ref: 233 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 8) What is the purpose of a data warehouse? Answer: A data warehouse takes data from the data manufacturers (operational systems and purchased data), cleans and processes the data, and locates the data on the shelves, so to speak, of the data warehouse. The people who work with a data warehouse are experts at data management, data cleaning, data transformation, data relationships and the like. However, they are not usually experts in a given business function. Page Ref: 233 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
22 Copyright © 2014 Pearson Education, Inc.
9) How is a data warehouse different from a data mart? Answer: The purpose of a data warehouse is to extract and clean data from operational systems and other sources, and to store and catalog that data for processing by business intelligence tools. In a way, one can think of a data warehouse as a distributor in a supply chain. The data warehouse takes data from the data manufacturers (operational systems, other internal systems, etc.), cleans and processes the data, and locates the data on its shelves, so to speak, of the data warehouse. The people who work with a data warehouse are experts at data management, data cleaning, data transformation, data relationships, and the like. Data warehouse business analysts know the general needs of the business, but they are not experts in a given business function. A data mart is a data collection, smaller than the data warehouse, that addresses the needs of a particular department or functional area of the business. If the data warehouse is the distributor in a supply chain, then a data mart is like a retail store in a supply chain. Users in the data mart obtain data that pertain to a particular business function from the data warehouse. Such users do not have the data management expertise that data warehouse employees have, but they are knowledgeable analysts for a given business function. Page Ref: 233 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 10) What is data mining? Answer: Data mining is the application of statistical techniques to find patterns and relationships among data for classification and prediction. Data mining techniques emerged from the combined discipline of statistics, mathematics, artificial intelligence and machine-learning. Most data mining techniques are sophisticated, and many are difficult to use well. Such techniques are valuable to organizations, however, and some business professionals, especially those in finance and marketing, have become expert in their use. Data mining techniques fall into two broad categories: unsupervised and supervised. Page Ref: 235 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
23 Copyright © 2014 Pearson Education, Inc.
11) What is unsupervised data mining? Answer: With unsupervised data mining, analysts do not create a model or hypothesis before running the analysis. Instead, they apply the data mining technique to the data and observe the results. With this method, analysts create hypotheses after the analysis to explain the patterns found. These findings are obtained solely by data analysis. One common unsupervised technique is cluster analysis. With it, statistical techniques identify groups of entities that have similar characteristics. A common use for cluster analysis is to find groups of similar customers from customer order and demographic data. Page Ref: 235 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 12) Explain supervised data mining. Answer: With supervised data mining, data miners develop a model prior to the analysis and apply statistical techniques to data to estimate parameters of the model. For example, suppose marketing experts in a communications company believe that cell phone usage on weekends is determined by the age of the customer and the number of months the customer has had the cell phone account. A data mining analyst would then run an analysis that estimates the impact of customer and account age. One such analysis, which measures the impact of a set of variables on another variable, is called a regression analysis. Page Ref: 235 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 13) What is BigData? Answer: BigData is a term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety. Considering volume, BigData refers to data sets that are at least a petabyte in size, and usually larger. Additionally BigData has high velocity, meaning that it is generated rapidly. BigData is varied. BigData may have structured data, but it also may have free-form text, dozens of different formats of web server and database log files, streams of data about user responses to page content, and possibly graphics, audio, and video files. BigData analysis can involve both reporting and data mining techniques. The chief difference is, however, that BigData has volume, velocity, and variation characteristics that far exceed those of traditional reporting and data mining. Page Ref: 236 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
24 Copyright © 2014 Pearson Education, Inc.
14) Differentiate between static reports and dynamic reports. Answer: Static reports are business intelligence documents that are fixed at the time of creation and do not change. A printed sales analysis is an example of a static report. In the business intelligence context, most static reports are published as PDF documents. Dynamic reports are business intelligence documents that are updated at the time they are requested. A sales report that is current as of the time the user accessed it on a Web server is a dynamic report. In almost all cases, publishing a dynamic report requires the business intelligence application to access a database or other data source at the time the report is delivered to the user. Page Ref: 239 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems
25 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 10: Information Systems Development Multiple Choice 1) The process of creating and maintaining information systems is called ________. A) systems development B) program development C) systems definition D) computer design Answer: A Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS) 2) Compared to program development, systems development is ________. A) narrower in focus B) less comprehensive C) broader in scope D) usually technical in nature Answer: C Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different methods for developing information systems 3) Which of the following is true of systems development? A) It has little need for human relations skills as tasks are performed by individuals, not groups. B) It is exclusively a technical task undertaken by programmers and hardware specialists. C) It is limited to the four domains of hardware, software, data, and procedures. D) It requires coordinated teamwork of both specialists and nonspecialists with business knowledge. Answer: D Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different methods for developing information systems
1 Copyright © 2014 Pearson Education, Inc.
4) Information systems are never ________. A) off-the-shelf B) tailor-made C) off-the-shelf with adaptation D) made-to-order Answer: A Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different methods for developing information systems 5) The bigger the system and the longer the project, ________. A) the lesser are the diseconomies of scale B) the more the requirements change C) the greater is the average contribution per worker D) the easier the task of scheduling Answer: B Page Ref: 257 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 6) According to Brooks' Law, adding more people to a late project ________. A) makes the project later B) decreases the overall cost C) improves the quality of work D) enhances the team's productivity Answer: A Page Ref: 258 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems
2 Copyright © 2014 Pearson Education, Inc.
7) Adding more people to a late systems development project will make the project later because ________. A) allocating tasks becomes easier B) training new people slows down team members C) analyzing the system requirements becomes complex D) budgeting project costs becomes complicated Answer: B Page Ref: 258 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 8) As development teams become larger, the average contribution per worker ________. A) increases B) decreases C) stabilizes D) increases, but only marginally Answer: B Page Ref: 258 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 9) As staff size increases, ________. A) the average contribution per worker also increases B) diseconomies of scale tend to level off and eventually decrease C) economies of scale consistently increase almost proportionately D) more meetings and coordination activities are required to keep everyone in sync Answer: D Page Ref: 258 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems
3 Copyright © 2014 Pearson Education, Inc.
10) Developers in the ________ phase of the SDLC use management's statement of the system needs in order to begin to define a new information system. A) system definition B) requirements analysis C) component design D) implementation Answer: A Page Ref: 259 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different methods for developing information systems 11) The ________ approach is the classical process used to develop information systems. A) rapid application development (RAD) B) object-oriented design (OOD) C) systems development life cycle (SDLC) D) extreme programming (XP) Answer: C Page Ref: 258 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different methods for developing information systems 12) The initial step in the first phase of the SDLC is to ________. A) assess the feasibility of the project B) define the goals and scope of the new system C) determine the schedule and budget for the project D) form the project team Answer: B Page Ref: 260 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different methods for developing information systems
4 Copyright © 2014 Pearson Education, Inc.
13) Which step in the SDLC process aims to eliminate obviously nonsensible projects? A) Define system goals and scope. B) Form the project team. C) Assess project feasibility. D) Plan the project. Answer: C Page Ref: 260 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 14) ________ feasibility concerns whether the new information system fits within a company's customs, culture, charter, or legal requirements. A) Technical B) Functional C) Administrative D) Organizational Answer: D Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different methods for developing information systems 15) ________ are IT professionals who understand both business and technology. A) Systems analysts B) Programmers C) Business analysts D) Beta testers Answer: A Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following statements is true regarding the composition of the development team over the life of the SDLC? A) User involvement is limited to the integrated testing and conversion phase of the SDLC. B) During requirements definition, the team will be heavy with systems analysts. C) During integrated testing and conversion, the team is made up of only programmers and designers. D) During design and implementation, the team will be heavy with business users. Answer: B Page Ref: 261 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different methods for developing information systems 17) The primary purpose of the requirements analysis phase is to ________. A) eliminate obviously nonsensible projects before forming a project development team B) identify the requisite skills needed in the IT personnel assigned to the project C) determine and document the specific features and functions of the new system D) investigate how much similar projects have cost in the past Answer: C Page Ref: 262 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems 18) Which is the most important phase in the systems development process? A) defining the goals and scope of the new information system B) implementing the information system C) determining the system's requirements D) adapting systems to changes in requirements Answer: C Page Ref: 262 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems
6 Copyright © 2014 Pearson Education, Inc.
19) During the requirements analysis phase of the SDLC, the development team will create a(n) ________ in case the new system involves a new database or substantial changes to an existing database. A) data model B) prototype C) archetype D) illustration Answer: A Page Ref: 262 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems 20) Which of the following statements is true with regard to the definition of requirements? A) Requirements determination is a simple, inexpensive process as it is limited to interviewing system users. B) Requirements should avoid specifying the volume of data to be stored and processed. C) Requirements determination should ideally focus on software and data components. D) Requirements include what is to be produced, as well as how frequently and how fast it is to be produced. Answer: D Page Ref: 262 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems 21) The easiest and cheapest time to alter the information system is in the ________ phase of the SDLC. A) requirements analysis B) system definition C) component design D) implementation Answer: A Page Ref: 264 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems
7 Copyright © 2014 Pearson Education, Inc.
22) In terms of software design, for ________, the team must determine candidate products and evaluate them against the requirements while for ________, the team produces design documentation for writing program code. A) off-the-shelf-with-alteration software; custom-developed programs B) off-the-shelf software; custom-developed programs C) off-the-shelf-with-alteration software; off-the-shelf software D) tailor-made software; off-the-shelf software Answer: B Page Ref: 265 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different methods for developing information systems 23) Normal processing procedures for system users are ________. A) procedures to continue operations when the system fails B) procedures for backing up data and other resources C) procedures for using the system to accomplish business tasks D) procedures to convert back to the system after recovery Answer: C Page Ref: 266 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different methods for developing information systems 24) Normal processing procedures for operations personnel are ________. A) procedures to continue operations when the system fails B) procedures for backing up data and other resources C) procedures for using the system to accomplish business tasks D) procedures for starting, stopping, and operating the system Answer: D Page Ref: 266 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different methods for developing information systems
8 Copyright © 2014 Pearson Education, Inc.
25) During the ________ phase of the SDLC process, developers construct, install, and test the components of the information system. A) requirements analysis B) database design C) feasibility assessment D) implementation Answer: D Page Ref: 266 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 26) A test plan ________. A) should not include the incorrect actions that users will take B) should cause every line of program code to be executed C) should cause only critical error messages to be displayed D) should be constructed by PQA personnel alone Answer: B Page Ref: 267 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 27) ________ is the process of allowing future system users to try out the new system on their own. A) PQA testing B) Acceptance testing C) Pretesting D) Beta testing Answer: D Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems
9 Copyright © 2014 Pearson Education, Inc.
28) Products in the beta test phase ________. A) are generally fully functioning B) are incomplete C) are in the first phase of testing D) are completely error-free Answer: A Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 29) ________ have the final say on whether a system is ready. A) Managers B) Systems analysts C) Users D) PQA personnel Answer: C Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 30) ________ refers to the process of moving the business activity from an old information system to a new system. A) System definition B) Test plan C) Parallel installation D) System conversion Answer: D Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems
10 Copyright © 2014 Pearson Education, Inc.
31) The advantage of ________ installation is that if the system fails, the failure is contained within a limited boundary. A) phased B) parallel C) pilot D) plunge Answer: C Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 32) In a ________ installation, the new system runs alongside the old one until it has been tested and is fully operational. A) pilot B) parallel C) phased D) plunge Answer: B Page Ref: 268 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 33) Parallel installation is the ________ style of installation. A) most preferred B) riskiest C) slowest D) least expensive Answer: C Page Ref: 268 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems
11 Copyright © 2014 Pearson Education, Inc.
34) Because of the significant risks involved, organizations should avoid this conversion style if possible. A) plunge B) parallel C) pilot D) phased Answer: A Page Ref: 268 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 35) Which of the following statements is true with regard to system maintenance? A) Software developers usually group enhancement requests and failures together. B) IS personnel prioritize system problems on a first-come-first-served basis. C) All commercial software products are shipped with known failures. D) All organizations track system failures and enhancements using word-processing documents. Answer: C Page Ref: 269 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Compare and contrast different methods for developing information systems 36) Software developers group fixes for high priority failures into a ________ that can be applied to all copies of a given product. A) service pack B) debugger C) patch D) system fix Answer: C Page Ref: 269 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
12 Copyright © 2014 Pearson Education, Inc.
37) Software vendors usually bundle fixes of low-priority problems into ________. A) patches B) service packs C) debuggers D) system fixes Answer: B Page Ref: 269 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 38) One of the reasons for SDLC problems is due to the ________ nature of the SDLC. This implies that the systems development process is supposed to operate in a sequence of nonrepetitive phases. A) network B) clustered C) parallel D) waterfall Answer: D Page Ref: 270 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 39) Projects that spend so much time ________ are sometimes said to be in analysis paralysis. A) in the system definition phase of the SDLC B) on project scheduling C) documenting requirements D) designing system components Answer: C Page Ref: 270 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Compare and contrast different methods for developing information systems
13 Copyright © 2014 Pearson Education, Inc.
True or False 1) Systems development has a broader scope than computer program development. Answer: TRUE Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different methods for developing information systems 2) Information systems involve people and procedures, so they can never be off-the-shelf. Answer: TRUE Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) Systems development is easy and risk-free. Answer: FALSE Page Ref: 255 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 4) The bigger the system and the longer the project, the more the requirements change. Answer: TRUE Page Ref: 257 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 5) One of the major challenges in systems development is changing technology. Answer: TRUE Page Ref: 257 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 6) Beyond a workgroup of four or five people, diseconomies of scale begin to take over. Answer: FALSE Page Ref: 258 14 Copyright © 2014 Pearson Education, Inc.
Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 7) Brooks' Law points out that whenever you add more people to a project, it will always delay the completion of the project. Answer: FALSE Page Ref: 258 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) The third phase of the systems development life cycle is the component design phase. Answer: TRUE Page Ref: 259 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 9) The description of fixes and new requirements is input into a system maintenance phase. Answer: TRUE Page Ref: 259 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the components of an information system (IS) 10) The goals and scope of a new information system are determined during the requirements analysis phase of the systems development life cycle. Answer: FALSE Page Ref: 259 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different methods for developing information systems
15 Copyright © 2014 Pearson Education, Inc.
11) The cost feasibility of a systems development project is usually expressed in exact figures or terms. Answer: FALSE Page Ref: 260 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 12) Organizational feasibility concerns how long it will take to complete the project. Answer: FALSE Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 13) Systems analysts are IT professionals who understand both business and technology. Answer: TRUE Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different methods for developing information systems 14) User involvement is redundant throughout the systems development process. Answer: FALSE Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different methods for developing information systems 15) Interviews are conducted with system users in the requirements analysis phase of the systems development life cycle. Answer: TRUE Page Ref: 262 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems
16 Copyright © 2014 Pearson Education, Inc.
16) The security needs of an information system are determined during the component design phase of the systems development life cycle. Answer: FALSE Page Ref: 262 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the components of an information system (IS) 17) The easiest and cheapest time to alter the information system is in the requirements analysis phase of the systems development life cycle. Answer: TRUE Page Ref: 264 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different methods for developing information systems 18) In terms of software design for custom-developed programs, the development team identifies off-the-shelf products and then determines the alterations required. Answer: FALSE Page Ref: 265 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 19) Test plans usually include not only the normal actions that users will take, but also incorrect actions. Answer: TRUE Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 20) Testing is often called product quality assurance (PQA). Answer: TRUE Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 17 Copyright © 2014 Pearson Education, Inc.
21) In a pilot installation, a new system is installed in phases across the organization. Answer: FALSE Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 22) In a plunge installation, the organization shuts off the old system and starts the new system. Answer: TRUE Page Ref: 268 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems 23) All commercial software products are shipped with known failures. Answer: TRUE Page Ref: 269 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 24) Projects that spend little time documenting requirements are sometimes said to be in analysis paralysis. Answer: FALSE Page Ref: 271 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 25) Actual systems development generally works in accordance with the waterfall nature of the systems development life cycle. Answer: FALSE Page Ref: 270 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Compare and contrast different methods for developing information systems 26) The software community has done much work to improve software development forecasting; therefore, scheduling and budgeting for new, large-scale systems is no longer problematic. Answer: FALSE 18 Copyright © 2014 Pearson Education, Inc.
Page Ref: 271 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Compare and contrast different methods for developing information systems Essay 1) What is systems development? How is it different from program development? Answer: Systems development is the process of creating and maintaining information systems. Systems development has a broader scope than computer program development as it involves all five components: hardware, software, data, procedures, and people. Developing a computer program, on the other hand, mostly involves software programs, with some focus on data and databases. Compared to program development, systems development requires more than just programming or technical expertise. Establishing the system's goals, setting up the project, and determining requirements require business knowledge and management skill. Tasks like building computer networks and writing computer programs require technical skills. Creating data models requires the ability to interview users and understand their view of the business activities. Designing procedures, especially those involving group action, requires business knowledge and an understanding of group dynamics. Developing job descriptions, staffing, and training all require human resource and related expertise. Thus, unlike program development, systems development is not an exclusively technical task undertaken by programmers and hardware specialists. Rather, it requires coordinated teamwork of both specialists and nonspecialists with business knowledge. Page Ref: 255 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the components of an information system (IS)
19 Copyright © 2014 Pearson Education, Inc.
2) Why is systems development difficult and risky? Answer: Systems development is difficult and risky because it is often very difficult to determine system requirements, which is further compounded by the fact that requirements tend to change as the system is developed. Usually, the bigger the system and the longer the project, the more the requirements change. Systems development also faces difficulties in terms of scheduling and budgeting. It is often difficult to estimate the time it will take to build a system and if labor hours cannot be estimated, labor costs cannot be estimated. Yet another challenge is that while the project is underway, technology continues to change. Lastly, as development teams become larger, the average contribution per worker decreases. This is true because as staff size increases, more meetings and other coordinating activities are required to keep everyone in sync. There are economies of scale up to a point, but beyond a workgroup of, say, 20 employees, diseconomies of scale begin to take over. Page Ref: 255-258 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) Explain how diseconomies of scale can affect systems development. Answer: Unfortunately, as development teams become larger, the average contribution per worker decreases. This is true because as staff size increases, more meetings and other coordinating activities are required to keep everyone in sync. There are economies of scale up to a point, but beyond a workgroup of, say, 20 employees, diseconomies of scale begin to take over. Brooks' Law points out a related problem: Adding more people to a late project makes the project later. Brooks' Law is true not only because a larger staff requires increased coordination, but also because new people need training. The only people who can train the new employees are the existing team members, who are thus taken off productive tasks. The costs of training new people can overwhelm the benefit of their contribution. Page Ref: 258 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different methods for developing information systems 4) What are the phases of the systems development life cycle (SDLC)? Answer: The five phases of the systems development life cycle are (1) system definition, (2) requirements analysis, (3) component design, (4) implementation, and (5) system maintenance. Page Ref: 259 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
20 Copyright © 2014 Pearson Education, Inc.
5) What are the main tasks that are performed during the system definition phase of the SDLC? Answer: During the system definition phase of the SDLC, the development team defines the goal and purpose of the new system. The project's scope is defined by specifying the users or the business processes or the plants, offices, and factories that will be involved. The next step is to assess feasibility. This step answers the question, "Does this project make sense?" The aim here is to eliminate obviously nonsensible projects before forming a project development team and investing significant labor. Feasibility has four dimensions: cost, schedule, technical, and organizational. If the defined project is determined to be feasible, the next step is to form the project team. Typical personnel on a development team are a manager, systems analysts, business analysts, programmers, software testers, and users. The first major task for the assembled project team is to plan the project. Members of the project team specify tasks to be accomplished, assign personnel, determine task dependencies, and set schedules. Page Ref: 260- 261 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS) 6) Typically, who are part of a systems project team? What are the roles of business analysts and systems analysts? Answer: Typical personnel on a development team are a manager (or managers for larger projects), business analysts, systems analysts, programmers, software testers, and users. Business analysts specialize in understanding business needs, strategies, and goals and helping businesses implement systems to accomplish their competitive strategies. Systems analysts are IT professionals who understand both business and technology. Systems analysts are closer to IT and are a bit more technical, though there is considerable overlap in the duties and responsibilities of business and systems analysts. Both are active throughout the systems development process and play a key role in moving the project through the systems development process. Business analysts work more with managers and executives; systems analysts integrate the work of the programmers, testers, and users. Depending on the nature of the project, the team may also include hardware and communications specialists, database designers and administrators, and other IT specialists. Page Ref: 261 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the components of an information system (IS)
21 Copyright © 2014 Pearson Education, Inc.
7) What is meant by technical feasibility and organizational feasibility? Answer: Technical feasibility refers to whether existing information technology is likely to be able to meet the needs of the new system. Organizational feasibility concerns whether the new system fits within the organization's customs, culture, charter, or legal requirements. Page Ref: 261 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) What is the importance of the requirements analysis phase of the SDLC? Answer: Determining the system's requirements is the most important phase in the systems development process. If the requirements are wrong, the system will be wrong. If the requirements are determined completely and correctly, then design and implementation will be easier and more likely to result in success. Sources of requirements include existing systems as well as the Web pages, forms, reports, queries, and application features and functions desired in the new system. Security is another important category of requirements. The easiest and cheapest time to alter the information system is in the requirements phase. Changing a requirement at this stage is simply a matter of changing a description. Changing a requirement in the implementation phase may require weeks of reworking applications components and the database. Page Ref: 262-264 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 9) How is software designed? Answer: Software design depends on the source of the programs. For off-the-shelf software, the team must determine candidate products and evaluate them against the requirements. For off-theshelf-with-alteration software, the team identifies products to be acquired off-the-shelf and then determines the alterations required. For custom-developed programs, the team produces design documentation for writing program code. Page Ref: 265 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
22 Copyright © 2014 Pearson Education, Inc.
10) What is a test plan? Answer: Once developers have constructed and tested all of the system components, they integrate the individual components and test the system. Software and system testing are difficult, time-consuming, and complex tasks. Developers need to design and develop test plans and record the results of tests. A test plan consists of sequences of actions that users will take when using the new system. Test plans include not only the normal actions that users will take, but also incorrect actions. A comprehensive test plan should cause every line of program code to be executed. The test plan should cause every error message to be displayed. Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 11) What is beta testing? Answer: Beta testing is the process of allowing future system users to try out the new system on their own. Software vendors, such as Microsoft, often release beta versions of their products for users to try and to test. Such users report problems back to the vendor. Beta testing is the last stage of testing. Normally, products in the beta test phase are complete and fully functioning; they typically have few serious errors. Page Ref: 267 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe the components of an information system (IS) 12) What are the four ways in which organizations can implement a system conversion? Answer: Organizations can implement a system conversion in one of four ways. In a pilot installation, the organization implements the entire system on a limited portion of the business. In a phased installation, the new system is installed in phases across the organization. With parallel installation, the new system runs in parallel with the old one until the new system is tested and fully operational. The final style of conversion is plunge installation (sometimes called direct installation). With it, the organization shuts off the old system and starts the new system. Page Ref: 267-268 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Compare and contrast different methods for developing information systems
23 Copyright © 2014 Pearson Education, Inc.
13) What are the tasks of system maintenance? Answer: The last phase of the SDLC is maintenance. Maintenance is a misnomer; the work done during this phase is either to fix the system so that it works correctly or to adapt it to changes in requirements. First, there needs to be a means for tracking both failures and requests for enhancements to meet new requirements. For small systems, organizations can track failures and enhancements using word-processing documents. Typically, IS personnel prioritize system problems according to their severity. They fix high-priority items as soon as possible, and they fix low-priority items as time and resources become available. Page Ref: 269-270 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe the components of an information system (IS) 14) What are patches and service packs? Answer: Patches are group fixes for high priority failures that can be applied to all copies of a given product. Software vendors supply patches to fix security and other critical problems. They usually bundle fixes of low-priority problems into larger groups called service packs. Users apply service packs in much the same way that they apply patches, except that service packs typically involve fixes to hundreds or thousands of problems. Page Ref: 269 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe the components of an information system (IS) 15) What are the problems associated with the SDLC waterfall? Explain with an example. Answer: Although the industry has experienced notable successes with the SDLC process, there have also been many problems with it. One of the reasons for SDLC problems is due to the waterfall nature of the SDLC. Like a series of waterfalls, the process is supposed to operate in a sequence of nonrepetitive phases. For example, the team completes the requirements phase and goes over the waterfall into the design phase, and on through the process. Most commonly, when design work begins and the team evaluates alternatives, they learn that some requirements statements are incomplete or missing. At that point, the team needs to do more requirements work, yet that phase is supposedly finished. Page Ref: 270-271 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 9 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
24 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 11: Information Systems Management Multiple Choice 1) ________ is another, more common title given to the vice president of information systems. A) CEO B) CTO C) CIO D) COO Answer: C Page Ref: 284 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) Other titles for the ________ include director of information services and director of computer services. A) CTO B) CFO C) CEO D) CIO Answer: D Page Ref: 284 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 3) The IS department's principal manager is the ________. A) CIO B) CEO C) CTO D) COO Answer: A Page Ref: 284 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
1 Copyright © 2014 Pearson Education, Inc.
4) In organizations where primary information systems support only accounting and finance activities, a reporting arrangement wherein the CIO reports to the ________ is practical. A) CEO B) COO C) CFO D) CTO Answer: C Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) In organizations that operate significant nonaccounting information systems, such as manufacturers, a reporting arrangement wherein the CIO reports to the ________ is more common and effective. A) CTO B) CFO C) CSO D) CEO Answer: D Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 6) An organization that wishes to leverage the power of social media and elastic cloud opportunities to help accomplish its goals and objectives should ideally turn to the ________ group within its IT department for information. A) operations B) development C) technology D) data administration Answer: C Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
2 Copyright © 2014 Pearson Education, Inc.
7) The CTO heads the ________ group in the IS department. A) operations B) technology C) trading and sales D) outsourcing relations Answer: B Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 8) Which of the following is true for the technology group in most IS departments? A) The size and structure of the technology group depends on whether programs are developed in-house. B) The technology group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. C) A technology office investigates new information systems technologies and determines how the organization can benefit from them. D) The technology department manages the computing infrastructure, including individual computers, computer centers, networks, and communications media. Answer: C Page Ref: 284 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) Which of the following is true for the various groups in an IS department? A) The technology group manages individual computers, computer centers, networks, and communications media. B) The development group monitors the user experience and responds to user problems. C) The development group manages the process of creating new information systems. D) The operations group investigates new information systems technologies and determines how the organization can benefit from them. Answer: C Page Ref: 285 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
3 Copyright © 2014 Pearson Education, Inc.
10) Of the following sentences, which one describes the operations group in an IS department? A) The operations group will be staffed primarily by systems analysts who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. B) The purpose of the operations group is to protect data and information assets by establishing data standards and data management practices and policies. C) The operations group manages the process of creating new information systems as well as maintaining existing information systems. D) An important function for the operations group is to monitor user experience and respond to user problems. Answer: D Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 11) The ________ group within the IS department manages the process of creating new information systems as well as maintaining existing information systems. A) technology B) operations C) development D) data administration Answer: C Page Ref: 285 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 12) Which of the following sentences is true for the development group of an IS department? A) The development group manages the process of creating new information systems as well as maintaining existing information systems. B) An important function for the development group is to monitor user experience and respond to user problems. C) This group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. D) The purpose of the development group is to protect data and information assets by establishing data standards and data management practices and policies. Answer: A Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
4 Copyright © 2014 Pearson Education, Inc.
13) If a company's IS-related programs are not developed in-house, then the development group within its IS department will be staffed primarily by ________. A) test engineers B) systems analysts C) technical writers D) programmers Answer: B Page Ref: 285 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 14) The development group in a company's IS department is staffed primarily by programmers, test engineers, technical writers, and other development personnel. Based on this information, which of the following is likely to be true? A) The company develops programs in-house. B) The company uses licensed software. C) The company has negotiated outsourcing agreements with other companies. D) The company contracts work to other companies. Answer: A Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 15) In the context of information systems, ________ means either fixing problems or adapting existing information systems to support new features and functions. A) replacement B) training C) maintenance D) programming Answer: C Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
5 Copyright © 2014 Pearson Education, Inc.
16) The ________ group protects data and information assets by establishing data standards and data management practices and policies. A) data mining B) information allocation C) development D) data administration Answer: D Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 17) A systems analyst ________. A) advises the CIO, executive groups, and project managers on emerging technologies B) works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine system test plans C) works with business leaders and planners to develop processes and systems that implement business strategy and goals D) helps users solve problems and provides training Answer: B Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 18) A ________ develops test plans, designs and writes automated test scripts, and performs testing. A) technical writer B) systems analyst C) PQA test engineer D) network administrator Answer: C Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
6 Copyright © 2014 Pearson Education, Inc.
19) A ________ monitors, maintains, fixes, and tunes computer networks. A) technical writer B) network programmer C) PQA test engineer D) network administrator Answer: D Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 20) A ________ performs a wide range of activities such as programming, testing, database design, communications and networks, project management, and so on, and is required to have an entrepreneurial attitude. A) systems analyst B) consultant C) small-scale project manager D) database administrator Answer: B Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 21) Which of the following would be the responsibilities of a small-scale project manager? A) initiate, plan, manage, monitor, and close down projects B) develop test plans, design and write automated test scripts, and perform testing C) advise CIO, executive group, and project managers on emerging technologies D) help users solve problems, provide training Answer: A Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
7 Copyright © 2014 Pearson Education, Inc.
22) A(n) ________ committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. A) enforcement B) disciplinary C) administrative D) steering Answer: D Page Ref: 288 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 23) ________ is the leasing of hardware and pre-installed operating systems. A) SaaS B) Outsourcing C) PaaS D) IaaS cloud hosting Answer: C Page Ref: 292 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 24) In ________, hardware and both operating system and application software are leased. A) SaaS B) outsourcing C) PaaS D) IaaS cloud hosting Answer: A Page Ref: 292 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
25) As a user of IS, you have a right to ________. A) keep your password unchanged indefinitely to ensure maximum data security B) make hardware modifications to your computer as you see fit C) contribute to requirements for new system features and functions D) install programs that you deem necessary for your entertainment Answer: C Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 26) Which of the following is an IS user's right? A) installing only authorized programs B) effective training C) reporting trivial problems D) learning basic computer skills Answer: B Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 27) Of the following, which is an IS user's responsibility? A) reliable network and Internet connections B) a secure computing environment C) protection from viruses and other threats D) installation of authorized programs Answer: D Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
9 Copyright © 2014 Pearson Education, Inc.
28) As a user of IS, you have a responsibility to ________. A) avoid reporting trivial problems B) properly prioritize system problems C) make hardware modifications to your computer as you see fit D) install computer patches and fixes that suit your needs Answer: A Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 29) As a user of IS, an employee has a responsibility to avoid ________. A) unauthorized hardware modifications B) changing system password too frequently C) backup procedures D) applying software patches Answer: A Page Ref: 295 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects True or False 1) Protection of information assets is a major function of the information systems department. Answer: TRUE Page Ref: 283 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) A common title for the principal manager of the IT department is Chief Development Officer. Answer: FALSE Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
10 Copyright © 2014 Pearson Education, Inc.
3) The responsibilities of the CIO are the same as those of the CTO. Answer: FALSE Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 4) In some organizations, the CIO reports to the COO, though most often report directly to the CEO. Answer: TRUE Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) The operations group within the IT department may include programmers, test engineers, and technical writers. Answer: FALSE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 6) The IS department is responsible for adapting infrastructure and systems to the new business goals. Answer: TRUE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 7) An important function of the development group within the IS department is to monitor user experience and respond to user problems. Answer: FALSE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
11 Copyright © 2014 Pearson Education, Inc.
8) As the IT department is responsible for maintaining the computers and related equipment and for connecting them to the organizational networks, the department will specify standard computer systems and configurations that it will support. Answer: TRUE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 9) The purpose of the data administration staff is to protect data and information assets by establishing data standards and data management practices and policies. Answer: TRUE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 10) The data, procedures, and people components of an information system require professionals with highly developed interpersonal communications skills. Answer: TRUE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 11) The size and structure of the development group depends on whether programs are developed in-house. Answer: TRUE Page Ref: 285 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) A technical writer writes program documentation, help-text, procedures, job descriptions, and training materials. Answer: TRUE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 12 Copyright © 2014 Pearson Education, Inc.
13) Small-scale project managers and large-scale project managers do the same jobs, but on projects with varying complexity. Answer: TRUE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 14) A user support representative installs software and repairs computer equipment. Answer: FALSE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) A systems analyst monitors, fixes, and tunes computer networks. Answer: FALSE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 16) A technical writer designs and writes computer programs. Answer: FALSE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 17) A database administrator designs and writes automated test scripts. Answer: FALSE Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
13 Copyright © 2014 Pearson Education, Inc.
18) It is the company management's responsibility to align all of the IT department's activities with the organization's primary goals and objectives. Answer: TRUE Page Ref: 287 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 19) IT infrastructure and systems are known to be particularly adaptable to change. Answer: FALSE Page Ref: 287 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 20) Sponsoring the steering committee is one of the functions of an information system. Answer: TRUE Page Ref: 288 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 21) A steering committee is a group of senior managers from the major business functions that works with the CIO to set the IS priorities and decide among major IS projects and alternatives. Answer: TRUE Page Ref: 288 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 22) Outsourcing is the process of performing a service for another organization. Answer: FALSE Page Ref: 288 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
14 Copyright © 2014 Pearson Education, Inc.
23) Gaining economies of scale is an advantage of outsourcing. Answer: TRUE Page Ref: 290 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 24) Implementation risk is increased by outsourcing IS services. Answer: FALSE Page Ref: 290 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 25) Acquiring licensed software is a form of outsourcing. Answer: TRUE Page Ref: 291 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 26) It is impossible to outsource an entire business function. Answer: FALSE Page Ref: 292 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 27) Outsourcing has no disadvantages whatsoever. Answer: FALSE Page Ref: 292 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
15 Copyright © 2014 Pearson Education, Inc.
28) Software as a service (SaaS) is an alternative to outsourcing, in which hardware and both operating system and application software are leased. Answer: TRUE Page Ref: 292 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 29) Platform as a service (PaaS) is the leasing of hardware and pre-installed operating systems as well as possibly DBMS systems. Answer: TRUE Page Ref: 292 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 30) Microsoft's Azure is an example of SaaS. Answer: FALSE Page Ref: 292 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 31) It is expensive and risky to change vendors. Answer: TRUE Page Ref: 293 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 32) For service oriented outsourcing, the vendor is in the driver's seat. Answer: TRUE Page Ref: 293 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
16 Copyright © 2014 Pearson Education, Inc.
33) The potential loss of intellectual capital is a concern related to outsourcing. Answer: TRUE Page Ref: 293 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 34) Exiting from an outsourcing agreement is extremely easy. Answer: FALSE Page Ref: 294 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 35) One of the responsibilities of the IT department is to maintain information systems and operate and manage infrastructure. Answer: TRUE Page Ref: 283 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 36) As a user, you have a right to have the computing resources you need to perform your work proficiently. Answer: TRUE Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 37) A reliable network means one that can be processed without problems almost all the time. Answer: TRUE Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
17 Copyright © 2014 Pearson Education, Inc.
38) As a user, you should not have to endure schedule slippages of a month or two. Such slippages are evidence of incompetent systems development. Answer: FALSE Page Ref: 295-296 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 39) It is the user's responsibility to install patches and fixes when asked to do so. Answer: TRUE Page Ref: 296 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 40) Knowledge of the responsibilities and duties of the IS department helps one become a more effective consumer of the IS department's resources. Answer: TRUE Page Ref: 297 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
18 Copyright © 2014 Pearson Education, Inc.
Essay 1) Describe the IS department's responsibility to plan for information systems and IT infrastructure. Answer: Information systems exist to further the organization's competitive strategy. They exist to facilitate business processes and to help improve decision making. Thus, there are no "IS projects"; instead, all projects involving IS are a part of some other business system or facilitate some business goal. The IS department has the responsibility of aligning all of its activities with the organization's primary goals and objectives. As new technology emerges, the IS department is responsible for assessing that technology and determining if it can be used to advance the organization's goals. Furthermore, as the business changes, the IS department is responsible for adapting infrastructure and systems to the new business goals. Page Ref: 283-284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) Explain the IS department's responsibility to develop and adapt information systems and IT infrastructure. Answer: Given a plan, the next task for the IS department is to create, develop, and adapt both information systems and IT infrastructure. The IS department is responsible for creating and adapting IT infrastructure, such as computer networks, servers, data centers, data warehouses, data marts, and other IS resources. The IS department is also charged with creating systems infrastructures, such as email systems, VPNs, company blogs, SharePoint sites, and other ISbased infrastructure the company needs. In most organizations, user departments pay for computers and related equipment out of their own budgets. However, because the IS department is responsible for maintaining that equipment and for connecting it to the organizational networks, the IS department will specify standard computer systems and configurations that it will support. The IS department is responsible for defining those specifications. Page Ref: 284-286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
19 Copyright © 2014 Pearson Education, Inc.
3) Compare the role of the chief information officer (CIO) and the role of the chief technology officer (CTO). Answer: Chief information officer (CIO) is generally the title of the principal manager of an organization's IS department. Like other senior executives, the CIO reports to the chief executive officer, although sometimes these executives report to the chief operating officer, who in turn reports to the CEO. In some companies, the CIO reports to the chief financial officer. The CIO has the responsibility of managing the IT department, communicating with executive staff on ITand IS-related matters. The CIO is also a member of the executive group. The chief technology officer (CTO) often heads the technology group within the IT department. The CTO sorts through new ideas and products to identify those that are most relevant to the organization. The CTO's job requires deep knowledge of information technology and the ability to envision how new IT will affect the organization over time. The CTO's responsibility is to advise the CIO, executive group, and project managers on emerging technologies. Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 4) What is the typical structure of an organization's IS department? Answer: A typical IS department consists of four groups—a technology office that investigates new information systems technologies and determines how an organization can benefit from them; an operations group that manages the computing infrastructure, including individual computers, computer centers, networks, and communications media; a development group that manages the process of creating new information systems as well as maintaining existing information systems; and an outsourcing relations group in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services. The data administration staff function protects data and information assets by establishing data standards and data management practices and policies. However, there are many variations in the structure of the IS department. In larger organizations, the operations group may itself consist of several different departments. Sometimes, there is a separate group for data warehousing and data marts. Page Ref: 284-285 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
20 Copyright © 2014 Pearson Education, Inc.
5) What is the responsibility of the technology office of a firm's IS department? Answer: Most IS departments include a technology office that investigates new information systems technologies and determines how the organization can benefit from them. For example, today many organizations are investigating cloud computing, virtualization, SOA, social networking, and user-generated content and planning on how they can best use those technologies to accomplish their goals and objectives. An individual called the chief technology officer (CTO) often heads the technology group. The CTO sorts through new ideas and products to identify those that are most relevant to the organization. The CTO's job requires deep knowledge of information technology and the ability to envision how new IS will affect the organization over time. Page Ref: 284 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 6) Describe the development group of a firm's IS department. Answer: The development group of an IT department manages the process of creating new information systems as well as maintaining existing information systems. The size and structure of the development group depends on whether programs are developed in-house. If not, this department will be staffed primarily by business and systems analysts who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software. If the organization develops programs in-house, then this department will include programmers, test engineers, technical writers, and other development personnel. Page Ref: 285 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 7) Describe the responsibilities of a systems analyst, a computer technician, and a network administrator. Answer: A systems analyst works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine system test plans. A computer technician installs software and repairs computer equipment and networks. A network administrator monitors, maintains, fixes, and tunes computer networks. Page Ref: 286 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
21 Copyright © 2014 Pearson Education, Inc.
8) What are a user's rights in relation to the IT department? Answer: In relation to the IT department, users have a right to computer hardware and programs that allow them to perform their jobs proficiently; reliable network and Internet connections: a secure computing environment, to protection from viruses, worms, and other threats, and a right to contribute to requirements for new system features and functions. Users also have a right to reliable systems development and maintenance; prompt attention to problems, concerns, and complaints; properly prioritized problem fixes and resolutions; and effective training to use systems to perform their jobs. Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 9) What are a user's responsibilities in relation to the IT department? Answer: In relation to the IT department, users have a responsibility to learn basic computer skills and the standard techniques and procedures for the applications they use; follow security and backup procedures, to protect their password(s); use computer resources according to their employer's computer-use policy; make no unauthorized hardware modifications; install only authorized programs; and apply software patches and fixes when directed to do so. When asked, they must devote the time required to respond carefully and completely to requests for requirements for new system features and functions. They mustn't resort to reporting trivial problems. Page Ref: 295 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
22 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter 12: Information Security Management Multiple Choice 1) An employee carelessly releases proprietary data to the media. This is a case of ________. A) loss of infrastructure resulting from human error B) unauthorized data disclosure resulting from human error C) loss of infrastructure resulting from malicious activity D) unauthorized data disclosure resulting from malicious activity Answer: B Page Ref: 310 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 2) Which of the following is an example of a security threat resulting from malicious human activity? A) an employee who misunderstands operating procedures B) an employee who accidentally deletes customer records C) an employee who inadvertently installs an old database on top of the current one D) an employee who intentionally destroys data or other system components Answer: D Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 3) A person calls the Stark residence and pretends to represent a credit card company. He asks Mrs. Stark to confirm her credit card number. This is an example of ________. A) hacking B) phishing C) pretexting D) sniffing Answer: C Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
1 Copyright © 2014 Pearson Education, Inc.
4) Which of the following is a synonym for phishing? A) drive-by sniffing B) e-mail spoofing C) IP spoofing D) system hacking Answer: B Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 5) ________ simply take computers with wireless connections through an area and search for unprotected wireless networks. A) Drive-by sniffers B) Spoofers C) Hackers D) Phishers Answer: A Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 6) A ________ pretends to be a legitimate company and sends emails requesting confidential data. A) hacker B) phisher C) drive-by sniffer D) sniffer Answer: B Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
2 Copyright © 2014 Pearson Education, Inc.
7) Mark recently received an email from what appeared to be a legitimate company, asking him to update and verify his credit card details. Unknowingly, he obliged and later realized that the information had been misused. Mark is a victim of ________. A) hacking B) phishing C) pretexting D) sniffing Answer: B Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 8) ________ is a technique for intercepting computer communications. A) Spoofing B) Hacking C) Pretexting D) Sniffing Answer: D Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 9) ________ occur when bogus services flood a Web server. A) Spoofing attacks B) Hacking attacks C) Phishing attacks D) DOS attacks Answer: D Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
3 Copyright © 2014 Pearson Education, Inc.
10) Some unauthorized programs are able to ________ legitimate systems and substitute their own processing. A) usurp B) spoof C) hack D) flood Answer: A Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 11) ________ occurs when a person gains unauthorized access to a computer system. A) Usurpation B) Spoofing C) Hacking D) Phishing Answer: C Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 12) A problem in a customer billing system that occurs due to errors made during software installation is a case of ________. A) faulty service resulting from human error B) distributed denial of service resulting from malicious activity C) faulty service resulting from malicious activity D) distributed denial of service resulting from human error Answer: A Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
4 Copyright © 2014 Pearson Education, Inc.
13) A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer. A) intrusion detection system B) account administration system C) key escrow D) malware definition Answer: A Page Ref: 315 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe different methods of managing IS security 14) Which of the following is considered a personal security safeguard? A) create backups of cookies and temporary files B) use https at trusted, reputable vendors C) use a single valid password for all accounts D) send all valuable data only via email or IM Answer: B Page Ref: 316 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe different methods of managing IS security 15) Which of the following is a human safeguard against security threats? A) backup B) firewalls C) physical security D) procedure design Answer: D Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following is a technical safeguard against security threats? A) passwords B) backup and recovery C) compliance D) identification and authorization Answer: D Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 17) A user name ________ a user. A) authenticates B) identifies C) conceals D) encrypts Answer: B Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 18) A password ________ a user. A) authenticates B) identifies C) conceals D) encrypts Answer: A Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 19) Which of the following is an example of a data safeguard? A) application design B) dissemination of information C) physical security D) malware protection Answer: C Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 6 Copyright © 2014 Pearson Education, Inc.
20) Users of smart cards are required to enter a ________ to be authenticated. A) PIN B) password C) biometric detail D) key Answer: A Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 21) A(n) ________ card has a microchip on it that is loaded with identifying data. A) USB B) biometric C) smart D) encryption Answer: C Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 22) ________ use(s) personal physical characteristics such as fingerprints, facial features, and retinal scans to verify users. A) Passwords B) Smart cards C) Biometric authentication D) Personal identification numbers Answer: C Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
7 Copyright © 2014 Pearson Education, Inc.
23) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Usurpation B) Authentication C) Standardization D) Encryption Answer: D Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 24) A(n) ________ sits outside the organizational network and is the first device that Internet traffic encounters. A) internal firewall B) perimeter firewall C) packet-filtering firewall D) malware firewall Answer: B Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 25) ________ firewalls can prohibit outsiders from starting a session with any user behind the firewall. A) Perimeter B) Internal C) Packet-filtering D) Malware Answer: C Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
8 Copyright © 2014 Pearson Education, Inc.
26) The program code that causes unwanted activity is called the ________. A) key escrow B) metadata C) widget D) payload Answer: D Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 27) The broadest definition of ________ includes viruses, worms, Trojan horses, spyware, and adware. A) malware B) metadata C) software D) widgets Answer: A Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 28) Which of the following are malware masquerading as useful programs? A) macro viruses B) Trojan horses C) worms D) payloads Answer: B Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
9 Copyright © 2014 Pearson Education, Inc.
29) What is the similarity between adware and spyware? A) Both masquerade as useful programs. B) Both are specifically programmed to spread. C) Both are installed without the user's permission. D) Both are used to steal data. Answer: C Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 30) ________ are the patterns that should be downloaded and updated frequently. A) Data safeguards B) Patches C) Antivirus scans D) Malware definitions Answer: D Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 31) ________ is an example of a data safeguard against security threats. A) Application design B) Backup and recovery C) Accountability D) Procedure design Answer: B Page Ref: 325 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security 32) Organizations should protect sensitive data by storing it in ________ form. A) digital B) standardized C) encrypted D) authenticated Answer: C Page Ref: 325 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security 10 Copyright © 2014 Pearson Education, Inc.
33) Because encryption keys can be lost or destroyed, a copy of the key should be stored with a trusted party. This safety procedure is sometimes called ________. A) key escrow B) white hat C) key encryption D) biometric authentication Answer: A Page Ref: 325 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security 34) Which of the following statements is true regarding position sensitivity? A) It is a type of data safeguard. B) It enables security personnel to prioritize their activities. C) It is documented only for high-sensitivity positions. D) It applies to new employees only. Answer: B Page Ref: 326 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 35) Enforcement of security procedures and policies consists of three interdependent factors: ________. A) centralized reporting, preparation, and practice B) account administration, systems procedures, and security monitoring C) separation of duties, least privilege, and position sensitivity D) responsibility, accountability, and compliance Answer: D Page Ref: 327 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security
11 Copyright © 2014 Pearson Education, Inc.
36) In terms of password management, when an account is created, users should ________. A) create two passwords and switch back and forth between those two B) immediately change the password they are given to a password of their own C) maintain the same password they are given for all future authentication purposes D) ensure that they do not change their passwords frequently, thereby reducing the risk of password loss Answer: B Page Ref: 328 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 37) Typically, a help-desk information system has answers to questions that only a true user would know, such as the user's birthplace, mother's maiden name, or last four digits of an important account number. This information ________. A) allows help-desk representatives to create new passwords for users B) reduces the strength of the security system C) protects the anonymity of a user D) helps authenticate a user Answer: D Page Ref: 328 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 38) Activity log analysis is an important ________ function. A) account administration B) security monitoring C) backup D) data administration Answer: B Page Ref: 329 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security
12 Copyright © 2014 Pearson Education, Inc.
39) Every organization should have a(n) ________ as part of the security program, which should include how employees are to react to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. A) key escrow B) smart card C) human safeguard plan D) incident-response plan Answer: D Page Ref: 330 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe different methods of managing IS security 40) Which of the following is true regarding an incident-response plan? A) The plan should provide decentralized reporting of all security incidents. B) The plan should require minimal training on the part of employees. C) The plan should identify critical personnel and their off-hours contact information. D) The plan should be simple enough to ensure a fast response with limited practice. Answer: C Page Ref: 331 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe different methods of managing IS security True or False 1) Pretexting occurs when someone deceives by pretending to be someone else. Answer: TRUE Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 2) Sniffing is usually initiated via email. Answer: FALSE Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
13 Copyright © 2014 Pearson Education, Inc.
3) Incorrectly increasing a customer's discount is an example of incorrect data modification. Answer: TRUE Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 4) System errors are not caused by human error. Answer: FALSE Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 5) Denial-of-service attacks are caused by human error, not malicious intent. Answer: FALSE Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 6) An Advanced Persistent Threat (APT) is a sophisticated, possibly long-running, computer hack that is perpetrated by large, well-funded organizations like governments. Answer: TRUE Page Ref: 313 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 7) In a brute force attack, the password cracker tries every possible combination of characters. Answer: TRUE Page Ref: 316 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe different methods of managing IS security
14 Copyright © 2014 Pearson Education, Inc.
8) Senior management has two critical security functions: security policy and risk management. Answer: TRUE Page Ref: 317 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 9) Malware protection is an example of a technical safeguard. Answer: TRUE Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 10) Creating backup copies of database contents is a technical safeguard. Answer: FALSE Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 11) Technical safeguards include passwords and encryption. Answer: FALSE Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe different methods of managing IS security 12) Technical safeguards involve just the software components of an information system. Answer: FALSE Page Ref: 319 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
15 Copyright © 2014 Pearson Education, Inc.
13) Smart cards are convenient and easy to use since they don't require a PIN number for authentication. Answer: FALSE Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 14) A criticism against biometric authentication is that it provides weak authentication. Answer: FALSE Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 15) Most secure communication over the Internet uses a protocol called HTTP. Answer: FALSE Page Ref: 321 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 16) Internal firewalls sit outside the organizational network. Answer: FALSE Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 17) Packet-filtering firewalls examine each part of a message and determine whether to let that part pass. Answer: TRUE Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
16 Copyright © 2014 Pearson Education, Inc.
18) Perimeter firewalls are the simplest type of firewall. Answer: FALSE Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 19) The existence of spyware is generally unknown to the user. Answer: TRUE Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 20) Viruses, worms, and Trojan horses are types of firewalls. Answer: FALSE Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 21) Most spyware is benign in that it does not perform malicious acts or steal data. Answer: FALSE Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 22) Once a backup of database contents is made, it is safe to assume that the database is protected. Answer: FALSE Page Ref: 325 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security
17 Copyright © 2014 Pearson Education, Inc.
23) In the context of human safeguards against security threats, the security sensitivity for each position should be documented. Answer: TRUE Page Ref: 326 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security 24) The existence of accounts that are no longer necessary do not pose a serious security threat. Answer: FALSE Page Ref: 328 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 25) Backup procedures for system users include backing up Web site resources, databases, administrative data, account and password data, and other data. Answer: FALSE Page Ref: 329 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 26) Every organization must have an incident-response plan that allows for decentralized reporting of all security incidents. Answer: FALSE Page Ref: 330 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe different methods of managing IS security
18 Copyright © 2014 Pearson Education, Inc.
Essay 1) Distinguish between phishing, spoofing, and sniffing. Answer: Phishing is a technique for obtaining unauthorized data that uses pretexting via email. The phisher pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth. Spoofing is another term for someone pretending to be someone else. IP spoofing occurs when an intruder uses another site's IP address as if it were that other site. Email spoofing is a synonym for phishing. Sniffing is a technique for intercepting computer communications. With wired networks, sniffing requires a physical connection to the network. With wireless networks, no such connection is required. Drive-by sniffers simply take computers with wireless connections through an area and search for unprotected wireless networks. Page Ref: 311 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security 2) Explain denial of service (DOS) in information management. Answer: Human error in following procedures or a lack of procedures can result in denial of service (DOS). For example, humans can inadvertently shut down a Web server or corporate gateway router by starting a computationally intensive application. An OLAP application that uses the operational DBMS can consume so many DBMS resources that order-entry transactions cannot get through. Denial-of-service attacks can be launched maliciously. A malicious hacker can flood a Web server, for example, with millions of bogus service requests that so occupy the server that it cannot service legitimate requests. Computer worms can infiltrate a network with so much artificial traffic that legitimate traffic cannot get through. Finally, natural disasters may cause systems to fail, resulting in denial of service. Page Ref: 312 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe different methods of managing IS security
19 Copyright © 2014 Pearson Education, Inc.
3) Discuss in brief the pros and cons of biometric authentication. Answer: Biometric authentication uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users. Biometric authentication provides strong authentication, but the required equipment is expensive. Often, too, users resist biometric identification because they feel it is invasive. Biometric authentication is in the early stages of adoption. Because of its strength, it likely will see increased usage in the future. It is also likely that legislators will pass laws governing the use, storage, and protection requirements for biometric data. Page Ref: 320 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 4) Differentiate between symmetric and asymmetric encryption. Answer: To encode a message, a computer program uses the encryption method with the key to convert a noncoded message into a coded message. The resulting coded message looks like gibberish. Decoding (decrypting) a message is similar; a key is applied to the coded message to recover the original text. With symmetric encryption, the same key is used to encode and to decode. With asymmetric encryption, two keys are used; one key encodes the message, and the other key decodes the message. Symmetric encryption is simpler and much faster than asymmetric encryption. A special version of asymmetric encryption, public key/private key, is used on the Internet. Page Ref: 320-321 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 5) What are firewalls? What types of firewalls are commonly used? Answer: A firewall is a computing device that prevents unauthorized network access. A firewall can be a special-purpose computer or it can be a program on a general-purpose computer or on a router. Organizations normally use multiple firewalls. A perimeter firewall sits outside the organizational network; it is the first device that Internet traffic encounters. In addition to perimeter firewalls, some organizations employ internal firewalls inside the organizational network. A packet-filtering firewall examines each part of a message and determines whether to let that part pass. To make this decision, it examines the source address, the destination address(es), and other data. Packet-filtering firewalls can prohibit outsiders from starting a session with any user behind the firewall. Page Ref: 322 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
20 Copyright © 2014 Pearson Education, Inc.
6) How is a Trojan horse different from a worm? Answer: There are many different types of viruses. Trojan horses are viruses that masquerade as useful programs or files. A typical Trojan horse appears to be a computer game, an MP3 music file, or some other useful, innocuous program. A worm is a virus that propagates using the Internet or other computer network. Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 7) What is the difference between adware and spyware? Answer: Spyware programs are installed on the user's computer without the user's knowledge or permission. Spyware resides in the background and, unknown to the user, observes the user's actions and keystrokes, monitors computer activity, and reports the user's activities to sponsoring organizations. Some malicious spyware captures keystrokes to obtain user names, passwords, account numbers, and other sensitive information. Other spyware supports marketing analyses, observing what users do, Web sites visited, products examined and purchased, and so forth. Adware is similar to spyware in that it is installed without the user's permission and it also resides in the background and observes user behavior. Most adware is benign in that it does not perform malicious acts or steal data. It does, however, watch user activity and produce pop-up ads. Adware can also change the user's default window or modify search results and switch the user's search engine. Page Ref: 323 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security 8) List some important malware safeguards. Answer: It is possible to avoid most malware using the following malware safeguards: (1) install antivirus and antispyware programs on your computer, (2) set up the anti-malware programs to scan your computer frequently, (3) update malware definitions, (4) open email attachments only from known sources, (5) promptly install software updates from legitimate sources, and (6) browse only in reputable Internet neighborhoods. Page Ref: 323-324 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe different methods of managing IS security
21 Copyright © 2014 Pearson Education, Inc.
9) How can data safeguards protect against security threats? Answer: Data safeguards protect databases and other organizational data. Both data and database administration are involved in establishing the data safeguards. First, data administration should define data policies. Then, data administration and database administration(s) work together to specify user data rights and responsibilities. Third, those rights should be enforced by user accounts that are authenticated at least by passwords. The organization should protect sensitive data by storing it in encrypted form. It is important to periodically create backup copies of database contents. Physical security is another data safeguard. Page Ref: 324-325 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security 10) Explain how defining positions in an organization can safeguard against security threats. Answer: Effective human safeguards begin with definitions of job tasks and responsibilities. In general, job descriptions should provide a separation of duties and authorities. For example, no single individual should be allowed to both approve expenses and write checks. Instead, one person should approve expenses, another pay them, and a third should account for the payment. Similarly, in inventory, no single person should be allowed to authorize an inventory withdrawal and also to remove the items from inventory. Given appropriate job descriptions, user accounts should be defined to give users the least possible privilege needed to perform their jobs. For example, users whose job description does not include modifying data should be given accounts with read-only privilege. Similarly, user accounts should prohibit users from accessing data their job description does not require. Because of the problem of semantic security, even access to seemingly innocuous data may need to be limited. Finally, the security sensitivity should be documented for each position. Some jobs involve highly sensitive data (e.g., employee compensation, salesperson quotas, and proprietary marketing or technical data). Other positions involve no sensitive data. Documenting position sensitivity enables security personnel to prioritize their activities in accordance with the possible risk and loss. Page Ref: 325-326 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Describe different methods of managing IS security
22 Copyright © 2014 Pearson Education, Inc.
11) What are the three interdependent factors involved in the enforcement of security policies and procedures? Answer: Enforcement consists of three interdependent factors: responsibility, accountability, and compliance. First, the company should clearly define the security responsibilities of each position. The design of the security program should be such that employees can be held accountable for security violations. Procedures should exist so that when critical data are lost, it is possible to determine how the loss occurred and who is accountable. Finally, the security program should encourage security compliance. Employee activities should regularly be monitored for compliance, and management should specify disciplinary action to be taken in light of noncompliance. Page Ref: 327 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security 12) Explain account management. Answer: Account management concerns the creation of new user accounts, the modification of existing account permissions, and the removal of unneeded accounts. Information system administrators perform all of these tasks, but account users have the responsibility to notify the administrators of the need for these actions. The IT department should create standard procedures for this purpose. The existence of accounts that are no longer necessary is a serious security threat. Information system administrators cannot know when an account should be removed; it is up to users and managers to give such notification. Page Ref: 327-328 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Describe different methods of managing IS security
23 Copyright © 2014 Pearson Education, Inc.
13) Describe an incident-response plan. Answer: Every organization should have an incident-response plan as part of the security program. The plan should include how employees are to respond to security problems, whom they should contact, the reports they should make, and steps they can take to reduce further loss. The plan should provide centralized reporting of all security incidents that will enable an organization to determine if it is under systematic attack or whether an incident is isolated. Centralized reporting also allows the organization to learn about security threats, take consistent actions in response, and apply specialized expertise to all security problems. Viruses and worms can spread very quickly across an organization's networks, and a fast response will help to mitigate the consequences. Because of the need for speed, preparation pays. The incidentresponse plan should identify critical personnel and their off-hours contact information. These personnel should be trained on where to go and what to do when they get there. Finally, organizations should periodically practice incident response. Page Ref: 330-331 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe different methods of managing IS security 14) What should an organization do when a security breach occurs in its information systems? Answer: When an incident does occur, speed is of the essence. Viruses and worms can spread very quickly across an organization's networks, and a fast response will help to mitigate the consequences. Because of the need for speed, preparation pays. The incident-response plan should identify critical personnel and their off-hours contact information. These personnel should be trained on where to go and what to do when they get there. Without adequate preparation, there is substantial risk that the actions of well-meaning people will make the problem worse. Organizations should periodically practice incident response. Without such practice, personnel will be poorly informed on the response plan, and the plan itself may have flaws that only become apparent during a drill. Page Ref: 330-331 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 8 Learning Outcome: Describe different methods of managing IS security
24 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 1: Collaboration Information Systems for Decision Making, Problem Solving, and Project Management Multiple Choice 1) ________ is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. A) Cooperation B) Groupthink C) Collaboration D) Brainstorming Answer: C Page Ref: 341 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2) Which of the following is true of collaboration? A) Iterations should be avoided for the smooth functioning of the collaborative process. B) Group members should not review each other's work negatively. C) Multiple iterations and feedback improve collaboration. D) Collaboration is more effective if it takes place at the final stage of a project. Answer: C Page Ref: 341 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 3) In a collaborative team, the work proceeds in a series of steps in which one person produces something, others criticize it, and then a revised version is produced. These steps are known as ________. A) iterations B) alternatives C) redundancies D) repetitions Answer: A Page Ref: 341 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
1 Copyright © 2014 Pearson Education, Inc.
4) Which of the following is true of students working cooperatively? A) They set forth an initial idea or work product. B) They work to accomplish their assignment independently. C) They revise the work product in accordance with feedback. D) They provide feedback to one another on the ideas. Answer: B Page Ref: 341 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 5) Which of the following is true of students working collaboratively? A) They merge their independent work for grading purposes. B) They work to accomplish their assignment independently. C) They divide the work into separate assignments for each student. D) They provide feedback to one another on the ideas. Answer: D Page Ref: 341 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 6) Which of the following is necessary for a collaboration to be successful? A) Collaborators should resist putting forward unpopular ideas. B) Collaborators should avoid entering into difficult conversations. C) Members must provide and receive critical feedback. D) Everyone in the group should be too polite to say anything critical. Answer: C Page Ref: 342 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 7) ________ is the single most important collaboration skill. A) Giving and receiving critical feedback B) Being a perceptive listener C) Being self-managing D) Willing to put forward unpopular ideas Answer: A Page Ref: 343 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2 Copyright © 2014 Pearson Education, Inc.
8) Which of the following approaches to teamwork will provide the best results? A) Sarah disagrees with the project plan but does not voice her opinion, because she doesn't want to disrupt the functioning of the team. B) Andrew believes that conflict is healthy for teamwork and doesn't hesitate to criticize the shortcomings of his coworkers. C) Caleb and Adam hold opposing political views, but do not discuss their opinions while working, so that other team members aren't distracted. D) Daniel is the team leader and discourages disagreements among team members so that the project can proceed faster. Answer: C Page Ref: 342-343 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 9) The two key characteristics of collaboration are ________. A) qualities and skills B) iteration and feedback C) decision-making and problem-solving D) ideas and work products Answer: B Page Ref: 344 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 10) Which of the following is a primary criterion for judging team success? A) giving and receiving critical feedback B) striving to attain balance C) demonstrating commitment to the group D) meaningful and satisfying experience Answer: D Page Ref: 344 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
3 Copyright © 2014 Pearson Education, Inc.
11) What is the first and most fundamental collaborative purpose? A) make decisions B) become informed C) manage projects D) solve problems Answer: B Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 12) ________ decisions are those that support day-to-day activities, such as how many widgets to order from a particular vendor. A) Managerial B) Critical C) Strategic D) Operational Answer: D Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 13) ________ decisions are decisions about the allocation and utilization of resources. A) Critical B) Operational C) Managerial D) Strategic Answer: C Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making
4 Copyright © 2014 Pearson Education, Inc.
14) ________ decisions are those that support broad-scope, organizational issues. A) Strategic B) Critical C) Operational D) Managerial Answer: A Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 15) Which of the following is true of a structured decision? A) A formula for computing the reorder quantity of an item in inventory is an example of a structured decision process. B) A structured decision is often collaborative. C) A structured decision process is one for which there is no agreed-on decision-making method. D) A structured decision is neither standardized nor broadly accepted. Answer: A Page Ref: 347 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 16) Which of the following is true of an unstructured decision? A) A unstructured decision seldom requires collaboration. B) A standard method for allocating furniture and equipment to employees is an unstructured decision process. C) An unstructured decision is neither standardized nor broadly accepted. D) An unstructured decision process is one for which there is an understood and accepted method for making the decision. Answer: C Page Ref: 347 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making
5 Copyright © 2014 Pearson Education, Inc.
17) The fundamental purpose of the ________ phase of project management is to set the ground rules for the project and the team. A) finalizing B) starting C) doing D) planning Answer: B Page Ref: 348 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 18) Which of the following tasks is performed during the starting phase of project management? A) prepare archival documents B) manage tasks and budget C) establish team rules D) determine schedule Answer: C Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 19) The purpose of the ________ phase of project management is to determine "who will do what and by when." A) finalizing B) starting C) doing D) planning Answer: D Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
6 Copyright © 2014 Pearson Education, Inc.
20) Which of the following tasks is performed during the planning phase of project management? A) assign tasks B) prepare archival documents C) establish team rules D) solve problems Answer: A Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 21) The purpose of the ________ phase of project management is to ensure that tasks are accomplished on time. A) finalizing B) starting C) doing D) planning Answer: C Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 22) Which of the following tasks is performed during the doing phase of project management? A) establish team rules B) document and report progress C) revise budget D) prepare archival documents Answer: B Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
7 Copyright © 2014 Pearson Education, Inc.
23) The ________ phase of project management requires teams to document its results, document information for future teams, close down the project, and disband the team. A) finalizing B) starting C) doing D) planning Answer: A Page Ref: 349-350 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 24) Which of the following tasks is performed during the finalizing phase of project management? A) solve problems B) document and report progress C) revise budget D) prepare archival documents Answer: D Page Ref: 350 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 25) Which of the following is true of project data? A) Schedules, tasks, budgets, and other managerial data are examples of project data. B) Project data is data that is used to manage the project. C) A document that describes a recommended solution is project data for a problem-solving project. D) Project data are not subject to iteration and feedback. Answer: C Page Ref: 350 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
26) Which of the following is true of project metadata? A) Project metadata is data that is part of the collaboration's work product. B) Project metadata are subject to iteration and feedback. C) A document that describes a recommended solution is project metadata for a problem-solving project. D) For a team that is designing a new product, design documents are examples of project metadata. Answer: B Page Ref: 350 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 27) Which of the following collaborative activities requires tracking many versions of many documents and other work product? A) promote team growth B) feedback C) accomplish task within time and budget D) iteration Answer: D Page Ref: 351 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 28) Which of the following collaborative activities requires providing easy-to-use and readily available multiparty communication? A) promote team growth B) feedback C) accomplish task within time and budget D) iteration Answer: B Page Ref: 351 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
9 Copyright © 2014 Pearson Education, Inc.
True or False 1) Cooperation is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. Answer: FALSE Page Ref: 341 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2) In a collaborative team, group members review each others' work product and revise that product as a result. Answer: TRUE Page Ref: 341 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 3) All group members should have the ability to provide and receive critical feedback for a successful collaboration. Answer: TRUE Page Ref: 342 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 4) Giving and receiving critical feedback is the single most important collaboration skill. Answer: TRUE Page Ref: 343 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 5) The two key characteristics of collaboration are iteration and feedback. Answer: TRUE Page Ref: 344 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
10 Copyright © 2014 Pearson Education, Inc.
6) Decision making is the first and most fundamental collaboration purpose. Answer: FALSE Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 7) Operational decisions are almost always collaborative. Answer: FALSE Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 8) Managerial decisions are decisions about the allocation and utilization of resources. Answer: TRUE Page Ref: 346 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 9) Unstructured decisions seldom require collaboration. Answer: FALSE Page Ref: 347 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 10) An unstructured decision process is one for which there is no agreed-on decision-making method. Answer: TRUE Page Ref: 347 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making
11 Copyright © 2014 Pearson Education, Inc.
11) Predicting the future direction of the economy or the stock market is a classic example of a structured decision. Answer: FALSE Page Ref: 347 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 12) The first and most important task for a problem-solving collaborative group is defining the problem. Answer: TRUE Page Ref: 347 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 13) The fundamental purpose of the starting phase of project management is to set the ground rules for the project and the team. Answer: TRUE Page Ref: 348 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) Team rules are established during the planning phase of project management. Answer: FALSE Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) Project tasks are accomplished during the doing phase of project management. Answer: TRUE Page Ref: 349 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
12 Copyright © 2014 Pearson Education, Inc.
16) Archival documents are prepared during the starting phase of project management. Answer: FALSE Page Ref: 350 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) Project data is data that is part of the collaboration's work product. Answer: TRUE Page Ref: 350 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 18) Schedules, tasks, budgets, and other managerial data are examples of project metadata. Answer: TRUE Page Ref: 350 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 19) Project metadata are not subject to iteration and feedback. Answer: FALSE Page Ref: 350 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
13 Copyright © 2014 Pearson Education, Inc.
Essay 1) Differentiate between cooperation and collaboration with examples. Answer: Cooperation is defined as a group of people working together, all doing essentially the same type of work, to accomplish a job. Collaboration is defined as a group of people working together to achieve a common goal via a process of feedback and iteration. Many, perhaps most, student groups incorrectly use cooperation rather than collaboration. Given an assignment, a group of five students will break it up into five pieces, work to accomplish their piece independently, and then merge their independent work for grading by the professor. In contrast, when students work collaboratively, they set forth an initial idea or work product, provide feedback to one another on those ideas or products, and then revise in accordance with feedback. Page Ref: 341 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2) Explain the three primary criteria for successful collaboration. Answer: There are three primary criteria for successful collaboration: 1. Successful outcome: Most students are primarily concerned with the first criterion. They want to achieve a good outcome, measured by their grade, or they want to get the project done with an acceptable grade while minimizing the effort required. For business professionals, teams need to accomplish their goals. 2. Growth in team capability: Most student teams are short-lived. But, in business, teams often last months or years. With experience, teams can become more effective. Activities are combined or eliminated. Linkages are established so that "the left hand knows what the right hand is doing," or needs, or can provide. Teams also get better as individuals improve at their tasks. 3. Meaningful and satisfying experience: The third element of Hackman's definition of team success is that team members have a meaningful and satisfying experience. The nature of team goals is a major factor in making work meaningful. If an individual's work is not only perceived as important, but the person doing that work is also given credit for it, then the experience will be perceived as meaningful. So, recognition for work well done is vitally important for a meaningful work experience. Page Ref: 344-345 Difficulty: Hard AACSB: Analytic Skills Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
14 Copyright © 2014 Pearson Education, Inc.
3) What are the three levels of decision making? Answer: Decisions are made at three levels: 1. Operational decisions are those that support operational, day-to-day activities. Typical operational decisions are: How many widgets should we order from vendor A? Should we extend credit to vendor B? In almost all cases, operational decisions need not involve collaboration. 2. Managerial decisions are decisions about the allocation and utilization of resources. Typical decisions are: How much should we budget for computer hardware and programs for department A next year? How many engineers should we assign to project B? In general, if a managerial decision requires consideration of different perspectives, then it will benefit from collaboration. 3. Strategic decisions are those that support broad-scope, organizational issues. Typical decisions at the strategic level are: Should we start a new product line? Should we open a centralized warehouse in Tennessee? Should we acquire company A? Strategic decisions are almost always collaborative. Page Ref: 346-347 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Explain how information systems can be used to assist in decision making 4) Explain the four phases of project management. Answer: The four phases of project management are: 1. Starting phase: The fundamental purpose of the starting phase is to set the ground rules for the project and the team. Other tasks during the starting phase are to set the scope of the project and to establish an initial budget. 2. Planning phase: The purpose of the planning phase is to determine "who will do what and by when." Work activities are defined, and resources such as personnel, budget, and equipment are assigned to them. Tasks often depend on one other. The project budget is usually revised during the planning phase as well. 3. Doing phase: Project tasks are accomplished during the doing phase. The key management challenge here is to ensure that tasks are accomplished on time, and, if not, to identify schedule problems as early as possible. As work progresses, additional trade-offs must be made, and often it is necessary to add or delete tasks, change task assignments, add or remove task labor or other resources, and so forth. Another important task is to document and report project progress. 4. Finalizing phase: In this phase, the team needs to document its results, document information for future teams, close down the project, and disband the team. Page Ref: 348-350 Difficulty: Moderate AACSB: Analytic Skills Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
15 Copyright © 2014 Pearson Education, Inc.
5) Differentiate between project data and project metadata. Answer: Project data is data that is part of the collaboration's work product. For example, for a team that is designing a new product, design documents are examples of project data. A document that describes a recommended solution is project data for a problem-solving project. Project metadata is data that is used to manage the project. Schedules, tasks, budgets, and other managerial data are examples of project metadata. Both types of data are subject to iteration and feedback. Page Ref: 350 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
16 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 2: Collaborative Information Systems for Student Projects Multiple Choice 1) ________ are useful when the team needs to meet on some topic, but not everyone can meet at the same time. A) Blogs B) Discussion forums C) Wikis D) Surveys Answer: B Page Ref: 355 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2) Synchronous communication is defined as ________. A) communication between similar people and groups in an organization B) communication between people working in the same department C) internal communication between the members of a specific group D) communication that occurs when all team members meet at the same time Answer: D Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 3) Which of the following is an example of synchronous communication? A) email B) team survey C) multiparty text chat D) discussion forum Answer: C Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
1 Copyright © 2014 Pearson Education, Inc.
4) ________ communication occurs when team members do not meet at the same time. A) Asynchronous B) Synchronous C) Procedural D) Nonprocedural Answer: A Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 5) Which of the following is an example of asynchronous communication? A) multiparty text chat B) videoconferencing C) email D) webinar Answer: C Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 6) ________ meetings are meetings in which participants do not meet in the same place, and possibly not at the same time. A) Concurrent B) Parallel C) Synchronous D) Virtual Answer: D Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
2 Copyright © 2014 Pearson Education, Inc.
7) If a virtual meeting is synchronous, participants should use ________ to interact with each other. A) discussion forums B) videoconferencing C) email D) team surveys Answer: B Page Ref: 356 Difficulty: Moderate AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 8) ________ are virtual meetings in which attendees view one of the attendees' computer screens for a more formal and organized presentation. A) Discussion forums B) Screen-sharing applications C) Conference calls D) Webinars Answer: D Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 9) In ________, one group member posts an entry, an idea, a comment, or a question, and other group members respond to it later, at their convenience. A) multiparty text chats B) team surveys C) webinars D) discussion forums Answer: D Page Ref: 358 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
3 Copyright © 2014 Pearson Education, Inc.
10) In ________, one team member creates a list of questions and other team members respond. A) multiparty text chats B) team surveys C) webinars D) discussion forums Answer: B Page Ref: 358 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 11) Which of the following is a content sharing technique in which the sender does not have any control or record of changes made to the shared content? A) email with attachments B) Windows Live SkyDrive C) Google Drive D) wikis Answer: A Page Ref: 359 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 12) Which of the following is a technology used to place content on a shared file server in a company? A) FTP B) TCP C) Windows Live SkyDrive D) Google Drive Answer: A Page Ref: 359 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following is true for shared content with version management? A) Content sharing methods that provide version management cannot accommodate concurrent work. B) Version management systems provide version control. C) Version management makes it impossible to know who changed the document and when. D) Systems that provide version management track changes to documents. Answer: D Page Ref: 360 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 14) Which of the following tools provides version management while sharing content? A) shared files on servers B) Google Drive C) emails with attachments D) Microsoft SharePoint Answer: B Page Ref: 360 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 15) Which of the following statements regarding Google Drive is true? A) Google tracks document revisions, with brief summaries of changes made. B) A Google account is not essential to edit Google Docs. C) A Google account is the same as a Gmail account. D) Microsoft Excel documents cannot be uploaded to Google Drive. Answer: A Page Ref: 360 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following systems provides version control while sharing content? A) Microsoft SharePoint B) Google Drive C) Windows Live SkyDrive D) File Transfer Protocol Answer: A Page Ref: 363 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 17) In version-control systems, shared documents are placed into shared directories called ________. A) work labs B) libraries C) workspaces D) records Answer: B Page Ref: 363 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 18) Which of the following is true of task and project management products? A) Users cannot add their own data to the default format of the task list. B) Microsoft Project Server allows only a single user to access shared project data via a web browser. C) It is possible to filter task lists to show only non-completed tasks using SharePoint. D) Microsoft Project is a desktop program that generates files that can be accessed by multiple users. Answer: C Page Ref: 365 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
6 Copyright © 2014 Pearson Education, Inc.
19) With the ________ collaboration tool set, the participant should be able to collaborate with his team, though he will get little support from the software. A) minimal B) optimal C) good D) comprehensive Answer: A Page Ref: 365 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 20) With the ________ collaboration tool set, the participant has the ability to conduct multiparty audio and video virtual meetings, and he/she will also have support for concurrent access to document, spreadsheet, and presentation files. A) minimal B) optimal C) good D) comprehensive Answer: C Page Ref: 365-366 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 21) The ________ collaboration tool set has a full set of features, including content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. A) minimal B) optimal C) good D) comprehensive Answer: D Page Ref: 366 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
7 Copyright © 2014 Pearson Education, Inc.
True or False 1) Discussion forums are useful when the team needs to meet on some topic, but not everyone can meet at the same time. Answer: TRUE Page Ref: 355 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 2) Asynchronous communication occurs when team members do not meet at the same time. Answer: TRUE Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 3) A face-to-face meeting is an example of asynchronous communication. Answer: FALSE Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 4) Virtual meetings can be synchronous or asynchronous. Answer: TRUE Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 5) A webinar is a virtual meeting in which attendees view one of the attendees' computer screens for a more formal and organized presentation. Answer: TRUE Page Ref: 356 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
8 Copyright © 2014 Pearson Education, Inc.
6) Videoconferencing is likely to be less intrusive than text chat. Answer: FALSE Page Ref: 357 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 7) Email is a tool used for synchronous communication. Answer: FALSE Page Ref: 357 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 8) In team surveys, one team member creates a list of questions and other team members respond. Answer: TRUE Page Ref: 358 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 9) The degree of version management is very high in email attachments. Answer: FALSE Page Ref: 358 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 10) Systems that provide version management track changes to documents and provide features and functions to accommodate concurrent work. Answer: TRUE Page Ref: 360 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
9 Copyright © 2014 Pearson Education, Inc.
11) A Google account is not essential to edit Google Docs. Answer: FALSE Page Ref: 360 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 12) Version management systems provide version control. Answer: FALSE Page Ref: 362 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 13) In version-control systems, shared documents are often placed in shared directories called libraries. Answer: TRUE Page Ref: 363 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 14) Workflows cannot be defined for multistage business processes. Answer: FALSE Page Ref: 364 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 15) With SharePoint, it is possible to filter task lists to show only non-completed tasks. Answer: TRUE Page Ref: 365 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
10 Copyright © 2014 Pearson Education, Inc.
16) Microsoft Project Server is a desktop program that generates files that can be accessed only by one user at a time. Answer: FALSE Page Ref: 365 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 17) With the minimal collaboration tool set, the participant should be able to collaborate with his team, though he will get little support from the software. Answer: TRUE Page Ref: 365 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 18) The good collaboration tool set includes content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. Answer: FALSE Page Ref: 366 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork Essay 1) Why should a team choose to use a collaboration information system? Answer: Collaboration is critical in business, and numerous software vendors and open source developers have created computer programs to facilitate various collaborative tasks. Once a team learns how to use the tools and has developed procedures for using them, teamwork will be easier. The team will no longer need to get everyone together face-to-face. It will no longer lose documents; it will be able to determine who is contributing and who is not. Another reason for using collaboration tools is that it will create better results. Such systems facilitate true collaboration, which means feedback and iteration. Each team member can produce documents, and others can comment and make revisions to them. Page Ref: 354-355 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
11 Copyright © 2014 Pearson Education, Inc.
2) Explain synchronous and asynchronous communications in organizations with examples. Answer: Synchronous communication occurs when all team members meet at the same time. Face-to-face meetings and conference calls are examples of synchronous communication. Asynchronous communication occurs when team members do not meet at the same time. Email, discussion forums, and team surveys are examples of asynchronous communication. Virtual meetings in which participants do not meet in the same place and possibly not at the same time are either synchronous or asynchronous communication. If the virtual meeting is synchronous (all meet at the same time), the participants can use conference calls, webinars, or multiparty text chat. A webinar is a virtual meeting in which attendees view one of the attendees' computer screens for a more formal and organized presentation. Videoconferencing is another synchronous method. When the team must meet asynchronously, most members try to communicate via email. Page Ref: 356-357 Difficulty: Easy AACSB: Communication Abilities Study Question: Study Question 2 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 3) What is version management and why is it important? Answer: Every collaborative project involves the sharing of content. Although email is simple, easy, and readily available, it will not suffice for collaborations in which there are many document versions or for which there is a desire for content control. Storing documents on servers is better than using email attachments because documents have a single storage location. They are not scattered in different team members' email boxes. However, without any version management it will be impossible to know who changed the document and when. Version management is a technique used for sharing electronic content. Systems that provide version management track changes to documents and provide features and functions to accommodate concurrent work. Wikis, Google Drive, and Windows Live SkyDrive are examples of systems that provide version management. With Google Drive, users can make documents available to others by entering their email addresses or Google accounts. Those users are notified that the document exists and are given a link by which they can access it. In the background, Google merges the users' activities into a single document. Google tracks document revisions, with brief summaries of changes made. Windows Live SkyDrive provides the ability to store and share Office documents and other files. Only one user at a time can open Windows Live SkyDrive documents for editing. Page Ref: 360-362 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork
12 Copyright © 2014 Pearson Education, Inc.
4) Explain version control with a simple example. Answer: Version control is the process of limiting the actions that can be taken by a particular user on shared documents. Version management systems improve the tracking of shared content and potentially eliminate problems caused by concurrent document access. They do not, however, provide version control. They do not limit the actions that can be taken by any particular user, and they do not give control over the changes to documents to particular users. With version-control systems, each team member is given an account with a set of permissions. Shared documents are placed into shared directories, sometimes called libraries. Furthermore, document directories can be set up so that users are required to check out documents before they can modify them. When a document is checked out, no other user can obtain it for the purpose of editing it. Once the document has been checked in, other users can obtain it for editing. Page Ref: 362-364 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 5) Explain the importance of Microsoft SharePoint in task management. Answer: Microsoft SharePoint has a robust task management capability. With it, you can create a special type of list, called a task list that is preconfigured to store data such as task title, description, assigned to, due date, status, predecessor tasks, and other useful task data. Users can also add their own data to the default format of the task list. With SharePoint, it is possible to filter task lists to show only non-completed tasks, or only tasks that are overdue, or tasks that are due within the next few days, or all of these as different reports on the team's site. SharePoint includes the option of showing task lists as daily, weekly, or monthly calendars. Page Ref: 365 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 6) What are the three sets of collaboration tools? Answer: The three sets of collaboration tools are: 1. The minimal collaboration tool set has the minimum possible set of tools. With this set, the participant should be able to collaborate with your team, though he/she will get little support from the software. 2. With the good collaboration tool set, the participant will have the ability to conduct multiparty audio and video virtual meetings, and he/she will also have support for concurrent access to document, spreadsheet, and presentation files. 3. The comprehensive collaboration tool set has a full set of features, including content management and control, workflow control, online meetings in which participants can view shared whiteboards, applications, and monitors. Page Ref: 365-366 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Explain how IS can enhance systems of collaboration and teamwork 13 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 3: Introduction to Microsoft Excel 2010 Multiple Choice 1) A ________ is a table of data having rows and columns. A) spreadsheet B) matrix C) gridline D) library Answer: A Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) In Excel, the rows are identified by ________. A) letters B) numbers C) Roman numerals D) symbols Answer: B Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) In Excel, the columns are identified by ________. A) letters B) numbers C) Roman numerals D) symbols Answer: A Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) In Excel, the term ________ refers to a single spreadsheet. A) datasheet B) matrix C) worksheet D) gridline Answer: C Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 5) In Excel, the intersection of a row and a column is called a(n) ________. A) junction B) gridline C) cell D) data point Answer: C Page Ref: 372 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 6) In Excel, the wide bar of tools and selections that appears just under the tabs is called the ________. A) menu tab B) task pane C) gridline D) ribbon Answer: D Page Ref: 373 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
2 Copyright © 2014 Pearson Education, Inc.
7) When adding graphs, hyperlinks, or images to an Excel worksheet, you use the ________ tab. A) Data B) Format C) View D) Insert Answer: D Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) In Excel, which of the following tabs can be used for filtering and sorting the data in your spreadsheet? A) Data B) Review C) Insert D) Home Answer: A Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) In Excel, the Review tab can be used for ________. A) creating more complex formulas B) filtering and sorting data in the spreadsheet C) tracking changes and making comments D) configuring the appearance of Excel Answer: C Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
10) The ________ tab is used for configuring the appearance of Excel. A) View B) Review C) Data D) Home Answer: A Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 11) In Excel, the most frequently used tools and selections appear under the ________ tab. A) Data B) Home C) View D) Review Answer: B Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 12) You have entered a formula in the cell G9. Which of the following would occur if you press the F2 function key after selecting the cell G9? A) The formula in G9 can be edited without retyping. B) The formula will be copied to the clipboard. C) A graph that explains the formula would appear. D) The formula in the cell will be locked. Answer: A Page Ref: 375 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
13) If a user types the value 100 into cell G1, presses Enter, and then clicks cell G1, a rectangle will be drawn around the cell with a little black box in the lower right-hand corner. Which of the following occurs if the user drags that little black box down to cell G7? A) Excel will fill in the value 100 multiplied by the number of cells in each of those cells. B) All of those cells will remain blank. C) Excel will fill in the value 100 into all of those cells. D) Excel will divide the corresponding value sequentially in each of those cells. Answer: C Page Ref: 376 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 14) Which of the following is true of rows and columns in Excel? A) To add a column, click the name of the column after which you want to insert columns. B) The cursor is moved to the left to increase the size of the column. C) To insert new rows, click the number of the row below which you want new rows, and select as many rows as you want to insert. D) The cursor is dragged up to decrease the height of the row. Answer: D Page Ref: 380 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) In Excel, if you click the center icons in the ________ section of the ribbon, the labels will appear centered both horizontally and vertically in the cell. A) Number B) Alignment C) Styles D) Editing Answer: B Page Ref: 381 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
16) In Excel, every formula must begin with a(n) ________ sign. A) plus B) minus C) percent D) equal Answer: D Page Ref: 382 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases 17) What is the meaning of the formula SUM (C3:C8)? A) Add all the values starting from the third cell to eighth cell in the third column. B) Add all the values starting from the third cell to eighth cell in the third row. C) Add the values of third cell in the third column and eighth cell in the third column. D) Add the values of third cell in the third row and eighth cell in the third row. Answer: A Page Ref: 384 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases 18) In Excel, ________ refers to whether the worksheet is printed normally or sideways on the page. A) layout B) orientation C) alignment D) gridline Answer: B Page Ref: 385 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss best practices for using and managing databases True or False 1) The rows in an Excel spreadsheet are identified by letters, and the columns are identified by numbers. Answer: FALSE Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 6 Copyright © 2014 Pearson Education, Inc.
2) An Excel workbook is a collection of one or more spreadsheets. Answer: TRUE Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) The intersection of a row and a column on a spreadsheet is called a data point. Answer: FALSE Page Ref: 372 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 4) To save a worksheet in Excel, you use the Save option in the Edit menu. Answer: FALSE Page Ref: 372 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) In Excel, the wide bar of tools and selections that appears just under the tabs is referred to as the Menu bar. Answer: FALSE Page Ref: 373 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) In Excel, the Insert tab is used to add pictures, graphs, and hyperlinks. Answer: TRUE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
7) In Excel, you would use the Review tab to format your page for printing. Answer: FALSE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) The View tab is used to configure the appearance of Excel. Answer: TRUE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) The Home tab holds the most frequently used tools and selections. Answer: TRUE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) Data can be imported to Excel from other programs. Answer: TRUE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) An Excel worksheet cannot add data based on a pattern. Answer: FALSE Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
12) Using the F2 key is recommended when you have a long value in a cell and need to edit a letter or two without retyping the whole entry. Answer: TRUE Page Ref: 375 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) A new row can be inserted at the desired point in an Excel worksheet by selecting the row below which you want to add the new row and clicking Insert. Answer: FALSE Page Ref: 378 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 14) In Excel, the entire row or column can be selected by clicking on the name of the row or column. Answer: TRUE Page Ref: 380 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) Microsoft Help can be accessed by clicking the question mark located in the ribbon bar below the Review tab. Answer: FALSE Page Ref: 382 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 16) In Excel, every formula must begin with an equal sign. Answer: TRUE Page Ref: 382 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
17) Orientation refers to whether the worksheet is printed upright or sideways on the page. Answer: TRUE Page Ref: 385 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss best practices for using and managing databases 18) The portion of the spreadsheet to be printed can be specified using the Print Preview feature. Answer: FALSE Page Ref: 386 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss best practices for using and managing databases Essay 1) What is a spreadsheet in Excel? Answer: A spreadsheet is a table of data having rows and columns, and is used to make calculations and for data processing. Electronic spreadsheets provide incredible labor savings over paper spreadsheets and were a major factor in the early adoption of personal computers. Page Ref: 371 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Explain the process of naming the rows, columns, and cells in Microsoft Excel. Answer: Excel spreadsheets have rows and columns. The rows are identified by numbers, and the columns are identified by letters. Because there are only 26 letters in the alphabet, the following scheme is used to label columns: The letters A through Z identify the first 26 columns; the letters AA through AZ identify the next 26; BA through BZ the next 26; and so forth. The intersection of a row and a column is called a cell. Each cell is identified by the name of its row and column. For example, cell K5 is situated in the K column and row number 5. Page Ref: 371-372 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
3) What are the different ways of entering data into an Excel worksheet? Answer: Data can be entered into an Excel worksheet in three ways: (1) key in the required data, (2) let Excel add data based on a pattern, and (3) import data from another program such as Microsoft Access. Page Ref: 374 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 4) Explain the process of inserting rows and columns in Microsoft Excel. Answer: To insert new rows in Microsoft Excel, click the number of the row above which you want new rows and select as many rows as you want to insert, right-click, and then select Insert. The new rows would be inserted above the selected row. To add columns in Microsoft Excel, click the name of the column before which you want to insert columns, select as many columns to the right of that as you want to add, right-click, and then select Insert. Page Ref: 378-381 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 5) The real power of Excel lies in its amazing computational capability. Explain. Answer: Excel can be used to work with a number of preprogrammed and user-created formulas. It has a system in place to highlight areas that need to be corrected and to assign color codes to the cells so that the user can easily see which cells are being used in a given formula. Excel also has the capability to copy formulas and adjust the terms of the formula so that each would refer to cells in the row to which it was copied. Finally, it has a number of preprogrammed activities that allow the users to sum figures, average figures, and perform many other calculations by selecting a choice from the Formulas tab. Page Ref: 382-384 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 4: Database Design Multiple Choice 1) Which of the following is true of a data model? A) It is created after the database is designed. B) It is an attribute whose value is associated with only one entity instance. C) It is a logical representation of the structure of the data. D) It does not describe the relationships among data. Answer: C Page Ref: 390 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 2) Once the users have validated and approved the data model, it is transformed into a ________. A) database design B) requirement report C) knowledge management system D) data repository Answer: A Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) Which of the following is a highly popular technique for creating a data model where the developers describe the content of a database by defining the things that will be stored in the database and the relationships among those entities? A) E-R data model B) UML model C) object-role model D) data integrity model Answer: A Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) The acronym UML refers to ________. A) unified markup language B) unified modeling language C) uniform markup language D) uniform modeling language Answer: B Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 5) Which of the following is true of entities? A) An identifier's value is associated with every entity in the data model. B) Entities can only represent a logical construct or transaction, not a physical object. C) Entities have attributes that describe characteristics of the entity. D) The relationships between entities are known as attributes. Answer: C Page Ref: 391 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 6) Entities have ________ that describe the characteristics of the entities. A) attributes B) dependencies C) cardinalities D) alternatives Answer: A Page Ref: 391 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 7) ________ are attributes whose values are associated with one and only one entity instance. A) Cardinalities B) Descriptors C) Dependencies D) Identifiers Answer: D Page Ref: 391 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 2 Copyright © 2014 Pearson Education, Inc.
8) In a classroom, each student can have multiple advisers. In a data model, this can be best represented by the ________. A) N:M relationship B) N:N relationship C) 1:N relationship D) 1:1 relationship Answer: C Page Ref: 392 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 9) The ________ notation signifies that an adviser can be related to many students and that a student can be related to many advisers. A) 1:N B) N:M C) N:1 D) N:N Answer: B Page Ref: 392 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 10) The little lines in an E-R diagram used as shorthand for the multiple lines between two entities are referred to as a(n) ________. A) crow's foot B) identifier C) attribute D) tracker Answer: A Page Ref: 392 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
11) Maximum cardinality in an E-R diagram refers to ________. A) the maximum number of relationships possible in a diagram B) the maximum number of entities that can be involved in a relationship C) the maximum number of constraints possible for a particular relationship D) the maximum number of attributes an entity can have Answer: B Page Ref: 393 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) The process of converting poorly structured tables into two or more well-structured tables is referred to as ________. A) replication B) integration C) actualization D) normalization Answer: D Page Ref: 394 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 13) The data integrity problem can occur only if ________. A) data are duplicated B) data are missing C) data are replaced D) data are redundant Answer: A Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
14) Normalized tables eliminate ________. A) data redundancy B) data duplication C) data entry D) data conversion Answer: B Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) The general goal of normalization is to ________. A) create a copy of an existing table B) construct tables such that every table has a similar topic C) convert two or more tables into a single table D) construct tables such that every table has a single topic Answer: D Page Ref: 395 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 16) Database practitioners classify tables into various ________ according to the kinds of problems they have. A) entities B) cardinalities C) normal forms D) attributes Answer: C Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
17) The easiest time to change the database structure is ________. A) during the data modeling stage B) after constructing the database C) during the data designing stage D) after creating the application programs Answer: A Page Ref: 398 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases True or False 1) The first step to finding volunteers for a new drive is calling volunteers from previous drives. Answer: TRUE Page Ref: 389 Difficulty: Easy AACSB: Reflective Thinking Skills Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) A data model is a logical representation of the structure of the data. Answer: TRUE Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) A data model does not depict the relationships among the data. Answer: FALSE Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) A data model can be transformed into a database design only after the users have approved and validated it. Answer: TRUE Page Ref: 390 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6 Copyright © 2014 Pearson Education, Inc.
5) Entities have attributes that describe characteristics of the entity. Answer: TRUE Page Ref: 391 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 6) An identifier is an attribute whose value is associated with every entity in the data model. Answer: FALSE Page Ref: 391 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 7) Entities have relationships to attributes, but not to each other. Answer: FALSE Page Ref: 392 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 8) In an E-R diagram, a line is used to represent a relationship between two entities. Answer: TRUE Page Ref: 392 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 9) The notation N:N is used to indicate a many-to-many relationship in E-R diagrams. Answer: FALSE Page Ref: 392 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
10) 1:N means that more than one entity is allowed on each side of the relationship and that the number of entities on each side can be different. Answer: FALSE Page Ref: 392-393 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) The crow's-foot notation shows the minimum number of entities that can be involved in a relationship. Answer: FALSE Page Ref: 392 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) The maximum number of entities that can be involved in a relationship is known as maximum cardinality. Answer: TRUE Page Ref: 393 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) Normalization is the process of converting poorly structured tables into two or more wellstructured tables. Answer: TRUE Page Ref: 394 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 14) The data integrity problem can occur only if data are missing. Answer: FALSE Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
15) The general goal of normalization is to construct tables such that every table has a single topic or theme. Answer: TRUE Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 16) Tables that are not normalized are subject to data integrity problems. Answer: TRUE Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 17) Database practitioners classify tables into various normal forms according to the kinds of problems they have. Answer: TRUE Page Ref: 395 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 18) The easiest time to change the database structure is after the database has been constructed and loaded with data. Answer: FALSE Page Ref: 398 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
Essay 1) Explain the database development process. Answer: A database application consists of forms, reports, queries, and application programs. First, the developers interview users and develop the requirements for the new system. During this process, the developers analyze existing forms, reports, queries, and other user activities. The requirements for the database are then summarized in something called a data model, which is a logical representation of the structure of the data. The data model contains a description of both the data and the relationships among the data. It is akin to a blueprint. Once the users have validated and approved the data model, it is transformed into a database design. After that, the design is implemented in a database, and that database is then filled with user data. Page Ref: 390 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 2) What are the different types of relationships represented in a data model? Answer: Entities in a data model have relationships with each other. Database designers use diagrams called entity-relationship (E-R) diagrams to explain the relationships. The relationships can be of three types: one-to-one, one-to-many, and many-to-many. The one-to-one relationship is denoted as 1:1, one-to-many is denoted as 1:N and N:1. The many-to-many relationship exists between groups of people and is denoted as N:M. Page Ref: 392-393 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 3) Explain the difference between maximum and minimum cardinality. Answer: Cardinality is the number of entities that can be involved in a relationship. There can be both a maximum and minimum constraint on cardinality. The crow's-foot notation shows the maximum number of entities that can be involved in a relationship. Accordingly, they are called the relationship's maximum cardinality. Common examples of maximum cardinality are 1:N, N:M, and 1:1. Constraints on minimum requirements are called minimum cardinalities. Page Ref: 393 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
4) How is a data model transformed into a database design? Answer: Database design is the process of converting a data model into tables, relationships, and data constraints. The database design team transforms entities into tables and expresses relationships by defining foreign keys. The tables in the model must be normalized before converting them into designs. Normalization is the process of converting poorly structured tables into two or more well-structured tables. Database practitioners classify tables into various normal forms according to the kinds of problems they have. Transforming a table into a normal form to remove duplicated data and other problems is called normalizing the table. After normalizing, the designer should represent the relationship among those tables to complete the design. Page Ref: 394-396 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 5) What are the steps involved in transforming a data model into a relational database design? Answer: The first step in transforming a data model into a relational database design involves the creation of a table for each entity by the database designer. The identifier of the entity becomes the key of the table. Each attribute of the entity becomes a column of the table. Next, the resulting tables are normalized so that each table has a single theme. Once that has been done, the next step is to represent the relationship among those tables. Page Ref: 396-398 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 6) Explain the role of users in designing a database. Answer: A database is a model of how the users view their business world. This means that the users are the final judges as to what data the database should contain and how the records in that database should be related to one another. The easiest time to change the database structure is during the data modeling stage. So the user should be actively involved in the modeling process. The user review of a data model is crucial. When a database is developed, the user must carefully review the data model. Page Ref: 398-399 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 5: Using Microsoft Access 2010 Multiple Choice 1) Before using a DBMS, the user should have created a(n) ________. A) data model B) database C) identifier D) attribute Answer: A Page Ref: 404 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Which of the following is the first activity to be performed on starting Microsoft Access? A) creating a database B) assigning field names C) creating a primary ID D) creating a table Answer: A Page Ref: 404 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) Which of the following statements is true about naming a new database in Microsoft Access? A) A user must type the name of his new database in the blank provided under File Name. B) A user must select the name of his new database from the drop down list provided next to the File name. C) Access opens the new database with the default name, database 1. D) Access opens the new database with the default name, database A. Answer: A Page Ref: 405 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) Access opens the new database by ________. A) creating a default table named Table A1 B) creating a default table named Table A C) creating a default table named Table 1 D) asking the user to name his/her table Answer: C Page Ref: 405 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 5) In Microsoft Access, different attributes are referred to as ________. A) data B) keys C) entities D) fields Answer: D Page Ref: 405 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 6) In Microsoft Access, the description of fields is used to ________. A) document the details of each field B) define rules for how each field should behave C) define how the fields should behave in case of exceptions D) characterize the fields in terms of their data types Answer: A Page Ref: 406 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 7) Relationships can be defined in Microsoft Access by selecting the ________ tab in the ribbon. A) Database Tools B) External Data C) Connections D) Add-ins Answer: A Page Ref: 410 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 2 Copyright © 2014 Pearson Education, Inc.
8) In Access, to create a relationship between two tables, users must ________. A) drag the primary key in one table to the foreign key in another table B) create a link between the foreign keys from both the tables C) drag the foreign key in one table to the primary key in another table D) create a link between the primary key in one table to the primary key in another table Answer: A Page Ref: 410 Difficulty: Moderate AACSB: Multicultural and Diversity Understanding Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) The step after creating a relationship between two tables is ________. A) to create macros B) to enter data C) to provide descriptions to each of the tables D) to create queries Answer: B Page Ref: 410 Difficulty: Moderate AACSB: Multicultural and Diversity Understanding Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) In Access, after creating a relationship between two tables, the user cannot and need not assign values for the ________. A) primary key B) tracker C) foreign key D) add-ons Answer: C Page Ref: 410 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
11) Which of the following is one of the alternatives for creating a data entry form? A) using the data definition tab B) using the query wizard C) using the property sheet D) using the default table display Answer: D Page Ref: 412 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) Which of the following options in Microsoft Access can be used to make the data entry form more pleasing for the users? A) Form B) Tab Order C) Property Sheet D) Add-ins Answer: A Page Ref: 413 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) In Access, records can be deleted by clicking the down arrow next to Delete and selecting Delete Record, which is present in the Records section of the ________ tab. A) Database Tools B) Home C) Fields D) File Answer: B Page Ref: 413 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
14) All modern DBMS products can process the ________ query language. A) SQL B) MySQL C) DB10 D) HTML Answer: A Page Ref: 415 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) To create a report with data from two or more tables, we must use the ________. A) Report Wizard B) Navigation tab C) Report Design D) Share Point lists Answer: A Page Ref: 418 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 16) Which of the following tabs in Microsoft Access is used to generate reports? A) Create B) Data C) Tools D) Format Answer: A Page Ref: 418 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases True or False 1) Before using any DBMS, the user should have created a data model from the users' requirements. Answer: TRUE Page Ref: 404 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 5 Copyright © 2014 Pearson Education, Inc.
2) An underlined attribute is the primary key and an italicized attribute is a foreign key. Answer: TRUE Page Ref: 404 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) Access opens a new database by creating a default table named Table A. Answer: FALSE Page Ref: 405 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 4) In Access, to modify the design of a default table, one must click View and select Design View in the upper right-hand corner of the Access window. Answer: FALSE Page Ref: 405 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 5) Every field in Microsoft Access must have a description associated with it. Answer: FALSE Page Ref: 406 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 6) The description field in Microsoft Access is used mainly for documentation. Answer: TRUE Page Ref: 406 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
6 Copyright © 2014 Pearson Education, Inc.
7) In Microsoft Access, a user has to define the relationships between fields before creating the tables. Answer: FALSE Page Ref: 406 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) In Microsoft Access, relationships can be defined by selecting the Database Tools tab. Answer: TRUE Page Ref: 410 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) In Microsoft Access, users must drag the foreign key in one table to the primary key in another table to enforce a relationship. Answer: FALSE Page Ref: 410 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) Unlike Microsoft Excel, users cannot key in data to Microsoft Access cells. Answer: FALSE Page Ref: 410 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) Microsoft Access provides a default table display for entering the data. Answer: TRUE Page Ref: 412 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
12) In Microsoft Access, the option to generate a data entry form is present in the Create ribbon. Answer: TRUE Page Ref: 413 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) Microsoft Access can be used to process the SQL query language. Answer: TRUE Page Ref: 415 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 14) Microsoft Access can be used to create and process queries. However, it does not provide a graphical interface for the queries. Answer: FALSE Page Ref: 415 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) To create a query, one must drag columns out of the required tables into the grid in the lower part of the query definition form. Answer: TRUE Page Ref: 416 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 16) By default, for queries of two or more tables, Access shows only those rows that have value matches in both tables. Answer: TRUE Page Ref: 417 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
17) To create a report with data from not more than two tables, we must use the Report Wizard. Answer: FALSE Page Ref: 418 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 18) In Microsoft Access, a report is created using a process similar to that for forms. Answer: TRUE Page Ref: 418 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 19) The option to create reports can be found in the Database Tools ribbon of Microsoft Access. Answer: FALSE Page Ref: 418 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases Essay 1) What steps must a database designer take before using a DBMS? Answer: Designers need to first create a data model from a list of the users' requirements. Then, the data model must be transformed into a database design. Only at this point should tables be created in a DBMS. Page Ref: 404 Difficulty: Moderate AACSB: Multicultural and Diversity Understanding Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Explain the procedure for creating a database using Microsoft Access. Answer: To create a new database, select Blank database under the Available Templates in the center of the opening screen. Then, type the name of the new database under File Name. Access will suggest a directory; change it if you want to use another one, and then click Create. Access opens the new database by creating a default table named Table1. Page Ref: 405 Difficulty: Moderate AACSB: Multicultural and Diversity Understanding Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 9 Copyright © 2014 Pearson Education, Inc.
3) Explain the procedure for establishing a relationship between two tables in Microsoft Access. Answer: After creating the tables in Microsoft Access, the next step is to define relationships. This can be done by clicking the Database Tools tab in the ribbon and then clicking the Relationships icon near the left-hand side of that ribbon. The Relationships window will open and the Show Table dialog box will be displayed. Double-clicking on two table names will cause both tables to be added to the Relationships window. Close the Show Table dialog box. To create the relationship between these two tables, click on the primary key attribute in the first table and drag that attribute on top of the primary key in the second table. In the dialog box, click Enforce Referential Integrity, then Cascade Update Related Fields, and then Cascade Delete Related Records. Close the Relationships window and save the changes when requested to do so. You now have a database with two tables and a relationship. Page Ref: 410-412 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) Explain the different alternatives provided by Microsoft Access for creating data entry forms. Answer: Access provides several alternatives for creating a data entry form. The first is to use the default table display. The default table display provided by Microsoft Access can be used to enter the required data. This display, although convenient, is limited in its capability. It also does not provide a very pleasing user interface. For more generality and better design, users can use the Access form generator. The form generator can generate a data entry form that is more pleasing to view and easier to use than the default table. Page Ref: 412-414 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 5) How can a user generate reports in Microsoft Access? Answer: To create a report with data from two or more tables, users should use the Report Wizard. Click the Create tab, and then in the Reports section click Report Wizard. Page Ref: 418-421 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 6: Using Excel and Access Together Multiple Choice 1) A user can readily create data entry forms, queries, and sophisticated and professional reports with the help of ________. A) Microsoft Publisher B) Microsoft Access C) Microsoft Word D) Microsoft Excel Answer: B Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) ________ is superior for tracking orders, inventory, equipment, people, and so forth. A) Microsoft Access B) Microsoft Excel C) Microsoft PowerPoint D) Microsoft Publisher Answer: A Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) Which of the following is an advantage of Microsoft Excel over Microsoft Access? A) Excel is superior for tracking orders, inventory, and equipment. B) Excel is superior for tracking people, such as employees and customers. C) Excel can be used to create better graphs and visual demonstrations. D) Excel can be used to create better data entry forms and professional reports. Answer: C Page Ref: 423 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) The process of transferring data from one computer system to another is referred to as ________. A) auto transfer B) import/export C) data shift D) reallocation Answer: B Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) Which of the following is true of import/export of data from Access to Excel? A) Data can only be transferred by exporting the data into a text file and then importing that text data. B) Delimited text files cannot be imported into both Excel and Access. C) The import/export process maintains an active connection to the source of the data. D) If data in Access is changed, the data must be re-imported into Excel to be up-to-date. Answer: D Page Ref: 423-424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 6) Delimited text files can be imported to Microsoft Access by selecting the ________ tab. A) Home B) Create C) Database Tools D) External Data Answer: D Page Ref: 424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
2 Copyright © 2014 Pearson Education, Inc.
7) Which of the following shows the correct steps for importing data into Excel from Access? A) Insert tab → Get External Data → From Access B) Edit tab → Get External Data → From Access C) File tab → Get External Data → From Text D) Data tab → Get External Data → From Text Answer: D Page Ref: 427 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) Which of the following shows the correct steps for creating a pie chart in Microsoft Excel? A) Add-Ins → Charts → Pie B) Insert → Illustrations → Pie C) Diagrams → Illustrations → Pie D) Insert → Charts → Pie Answer: D Page Ref: 427 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 9) Which of the following Excel diagrams is the best to compare various growth alternatives of different employees? A) pie charts B) column charts C) scatter diagrams D) Venn diagrams Answer: B Page Ref: 429 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following tabs in Microsoft Excel contains the option to create a column chart? A) Data B) Home C) Insert D) Tools Answer: C Page Ref: 429 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) Which of the following shows the correct steps for creating a column chart in Microsoft Excel? A) Diagrams → Illustrations → Column B) Add-Ins → Charts → Column C) Insert → Illustrations → Column D) Insert → Charts → Column Answer: D Page Ref: 429 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) In Microsoft Access, the Totals button is present in the ________ section of the Design tab. A) Results B) Show/Hide C) Query Type D) Query Setup Answer: B Page Ref: 431 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following shows the correct steps for formatting the currency values in Microsoft Excel? A) Home → Number → Currency B) Data → Number → Currency C) Home → Editing → Currency D) Data → Editing → Currency Answer: A Page Ref: 436 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 14) Data can be transferred from Excel to Access by creating a(n) ________, which is a subset of the cells in a worksheet that has a unique name. A) specified label B) individual data C) named range D) unique path Answer: C Page Ref: 439 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases 15) Which of the following procedures must be used to create a named range for a data in Access? A) highlight the required data → click the Formulas tab → click Define Name in the Defined Names section → enter a suitable name B) highlight the required data → click the Home tab → click Insert Name in the Cells section → enter a suitable name C) highlight the required data → click the Data tab → click Connections in the Connections section → enter a suitable name D) highlight the required data → click the Design tab → click Property Sheet in the Show/Hide section → enter a suitable name Answer: A Page Ref: 439 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
True or False 1) Microsoft Access is a database management system. Answer: TRUE Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Excel is superior to Access for tracking orders, inventory, equipment, and people. Answer: FALSE Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) To use Excel to process data stored in Access, it is recommended to rekey all of the Access data into Excel. Answer: FALSE Page Ref: 423 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 4) Import/export is the process of transferring data from one computer system to another. Answer: TRUE Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) In Excel and Access, import/export maintains an active connection to the source of the data. Answer: FALSE Page Ref: 423 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
6 Copyright © 2014 Pearson Education, Inc.
6) If users subsequently change the Access data, the imported data in Excel will be out-of-date until it is re-imported. Answer: TRUE Page Ref: 423-424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 7) Commas cannot be used to separate field data if the data itself contains commas. Answer: TRUE Page Ref: 424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) Delimited text files cannot be imported into either Excel or Access. Answer: FALSE Page Ref: 424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) To import data into Excel, open Excel, click the Data tab, and in the Get External Data section of that ribbon click From Text. Answer: TRUE Page Ref: 427 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) Data can be exchanged between Excel and Access by exporting the data into a text file and then importing that text data. Answer: TRUE Page Ref: 427 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
11) Microsoft Excel includes comprehensive tools for graphing data. Answer: TRUE Page Ref: 427 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) A pie chart can be created by selecting the Charts option from the Data tab ribbon in Microsoft Excel. Answer: FALSE Page Ref: 427 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) A pie chart can be used to compare results for two years or more. Answer: FALSE Page Ref: 429 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 14) To create a column chart, the data is highlighted and the Column option in the Charts section of the Insert tab is selected. Answer: TRUE Page Ref: 429 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 15) The Totals button is present in the Results section of the Design tab. Answer: FALSE Page Ref: 431 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
16) Access queries can be imported into Microsoft Excel. Answer: TRUE Page Ref: 431 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 17) Importing data from Access to Excel is easily achieved by clicking the Data tab and directing Excel to get the external data from Access. Answer: TRUE Page Ref: 436 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases 18) A user can produce two different reports from a single set of Excel data, by importing this data into Access and using the Access report generator. Answer: TRUE Page Ref: 439 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases 19) Data can be transferred from Excel to Access by creating a specified label, which is a subset of the cells in a worksheet that has a unique name. Answer: FALSE Page Ref: 439 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases 20) In Excel, the underscore character is used to connect the words in a name range. Answer: TRUE Page Ref: 439 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
21) Excel cannot be used to perform calculations on data imported from Access. Answer: FALSE Page Ref: 443 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 7 Learning Outcome: Discuss best practices for using and managing databases Essay 1) Explain the significance of using Access and Excel together. Answer: Excel is good at processing interrelated formulas. Because of this strength, business users often select Excel for processing financial statements, creating budgets, and performing financial analyses. Excel can be used to create sophisticated and stylish graphics with very little work from the user. Access is a DBMS, and the primary purpose of a DBMS is to keep track of things. Access is superior for tracking orders, inventory, equipment, people, and so forth. Users can readily create data entry forms, queries, and sophisticated and professional reports with Access. So, it is often necessary to use Excel to process data stored in Access and vice versa. For example, Excel can be used to create graphs of Access data and Access can be used to summarize Excel data and produce sophisticated reports. Page Ref: 423 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) What is import/export of data? Why is it necessary to refresh the import/export data in Excel and Access on a timely basis? Answer: Import/export is the process of transferring data from one computer system to another. In almost all cases, including Excel and Access, import/export does not maintain an active connection to the source of the data. If users subsequently change the Access data, the imported data in Excel will be out-of-date until the users re-import it. Because imported data can become out-of-date, users should develop procedures (either manual or automated) to ensure that data are refreshed on a timely basis. Page Ref: 423-427 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
3) What are delimited text files? Answer: Delimited text files are files that have field values separated by common symbols known as delimiters. The files that use commas as delimiters are known as comma-delimited files. Sometimes, however, the data itself contains commas, and so commas cannot be used to separate field data. In that case, some other character is used to delimit the fields. The tab character is frequently used, in which case the export file is called a tab-delimited file. Delimited text files are easy to import into either Excel or Access. Page Ref: 424 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) Explain the procedure for creating graphs in Microsoft Excel. Answer: Microsoft Excel includes comprehensive tools for graphing data. It can be used to construct column and bar charts, pie charts, line and scatter plots, and others graphs. Graphs can be created by clicking the Insert tab in the ribbon, selecting the Charts section of that ribbon, and selecting the required graph from the dropdowns. To create a pie chart, for example, we must highlight the cells which have the required data, click the Insert tab in the ribbon, and in the Charts section of that ribbon select the Pie icon. Excel can create several different versions of pie charts. Excel provides many different tools to customize a graph. To access them, click the graph you want to change. Excel will show a special tab called Chart Tools at the top of the window. Click Chart Tools to make them available. Page Ref: 427-431 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 5) How can you use Excel to graph Access data? Answer: Access data, including queries, can be imported to Excel to display the results with the help of Excel's graphing capabilities. To import data into Excel, open Excel, click the Data tab in the ribbon and then, in the Get External Data section, select From Access option. Excel will query Access to determine the tables and queries that exist in the chosen database. Next, Excel will ask how you want the data displayed. Choose Table and Existing worksheet, and enter an absolute address for the top, left-hand corner of the table. Use the displayed data to create graphs in Excel. Page Ref: 435-438 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 7: Mobile Systems Multiple Choice 1) ________ systems are information systems that support users in motion. A) Data B) Mobile C) Remote D) Web-based Answer: B Page Ref: 450 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) Which of the following is true of mobile systems? A) Just-in-time data creates a premium on the ability to memorize vast quantities of product data. B) Mobile systems decrease the speed of business. C) The usage of mobile systems results in the organizations being effective with part-time employees and independent contractors. D) Just-in-time data removes the premium for the ability to access, query, and present the data. Answer: C Page Ref: 453 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) ________ data is data delivered to the user at the precise time it is needed. A) Time-oriented B) Just-in-time C) Context-sensitive D) Object-oriented Answer: B Page Ref: 453 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
1 Copyright © 2014 Pearson Education, Inc.
4) A ________ application is a thick-client application that is designed to work with a particular operating system, and sometimes even designed to work only with a particular mobile device that runs that operating system. A) native B) virtual C) remote D) lean Answer: A Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 5) In a ________ application, the browser provides a more-or-less consistent environment for the application. A) virtual B) native C) thick-client D) thin-client Answer: D Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 6) ________ languages can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change. A) Data-sensitive B) Time-oriented C) Object-oriented D) Context-sensitive Answer: C Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies
2 Copyright © 2014 Pearson Education, Inc.
7) Native mobile applications can be differentiated from thin-client mobile applications in that native mobile applications ________. A) are developed by professional programmers and technically oriented Web developers and business professionals B) use HTML5, CSS3, and JavaScript as development languages C) only run on the operating system for which they are programmed D) are dependent on browser differences only Answer: C Page Ref: 454 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 8) Which of the following development languages is used in native mobile applications? A) CSS3 B) HTML5 C) JavaScript D) Objective-C Answer: D Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 9) Thin-client mobile applications can be differentiated from native mobile applications in that thin-client mobile applications ________. A) are limited by the capabilities of the browser B) are developed by professional programmers only C) only run on the operating system for which they are programmed D) use Objective-C, Java, and VB.Net as their development languages Answer: A Page Ref: 456 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following development languages is used in thin-client mobile applications? A) VB.Net B) HTML5 C) Java D) Objective-C Answer: B Page Ref: 456 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) Chrome is a term that refers to the ________ in a computer display. A) Web applications B) browsers C) visual overhead D) taskbar Answer: C Page Ref: 458 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 12) Some mobile applications provide ________ chrome, meaning it pops up in the display when appropriate. A) context-sensitive B) time-oriented C) data-sensitive D) object-oriented Answer: A Page Ref: 459 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies
4 Copyright © 2014 Pearson Education, Inc.
13) ________ occurs when users move their activities, especially long-running transactions, across devices. A) Cloud computing B) Roaming C) Direct interaction D) Interfacing Answer: B Page Ref: 461 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 14) ________ data is data that the server sends to the device. A) Nonlinear B) Linear C) Pull D) Push Answer: D Page Ref: 462 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 15) ________ data is data that the device requests from the server. A) Nonlinear B) Linear C) Pull D) Push Answer: C Page Ref: 462 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following is an advantage of employee use of mobile systems at work? A) cost savings B) less risk of infection C) lower compatibility problems D) no real danger of lost or damaged data Answer: A Page Ref: 463 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies 17) Which of the following is a disadvantage of employee use of mobile systems at work? A) lower productivity B) lower employee satisfaction C) greater need for training D) real danger of lost or damaged data Answer: D Page Ref: 463 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies 18) Which of the following is true of the "bring your own device" (BYOD) policy? A) The organization creates secure application services using https that require employee signon, but they can be accessed only from a mobile device that is connected to the network. B) If the organization wants to own any mobile device that employees connect to its network, the policy must be part of the employee's contract. C) If the employees sign on to the organization's network with their mobile devices, the organization is financially responsible for any damage they do. D) This policy does not allow the organization to sniff employees' mobile traffic. Answer: B Page Ref: 464 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies
6 Copyright © 2014 Pearson Education, Inc.
True or False 1) Mobile systems are information systems that support users in motion. Answer: TRUE Page Ref: 450 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) Mobile systems users only move geographically, not from device to device. Answer: FALSE Page Ref: 450 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 3) The major reason for the importance of mobile systems is the size of their market. Answer: TRUE Page Ref: 450 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 4) Just-in-time data is data delivered to the user at the precise time it is needed. Answer: TRUE Page Ref: 453 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 5) Just-in-time data removes the premium for the ability to access, query, and present that data. Answer: FALSE Page Ref: 453 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 7 Copyright © 2014 Pearson Education, Inc.
6) Mobile systems decrease the speed of business, which is a disadvantage for those who desire the ability to nimbly respond to changing conditions and succeed with the unexpected. Answer: FALSE Page Ref: 453 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies 7) A native application is a thick-client application that is designed to work with a particular operating system. Answer: TRUE Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 8) Native mobile applications only run on the operating system for which they are programmed. Answer: TRUE Page Ref: 454 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 9) Native mobile applications can be developed by technically oriented Web developers and business professionals. Answer: FALSE Page Ref: 456 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies
8 Copyright © 2014 Pearson Education, Inc.
10) Thin-client mobile applications are developed using professional programming languages, such as Objective-C and VB.Net. Answer: FALSE Page Ref: 455 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 11) Thin-client applications are limited by the capabilities of the browser. Answer: TRUE Page Ref: 456 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 12) The major advantage of native applications over thin-client applications is that they will run on any operating system and mobile device. Answer: FALSE Page Ref: 456 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 13) Chrome is a term that refers to the visual overhead in a computer display. Answer: TRUE Page Ref: 458 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 14) Mobile applications provide context-sensitive chrome, meaning it pops up in the display when appropriate. Answer: TRUE Page Ref: 459 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 9 Copyright © 2014 Pearson Education, Inc.
15) Cloud computing occurs when users move their activities, especially long-running transactions, across devices. Answer: FALSE Page Ref: 462 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 16) Push data is data that the device requests from the server. Answer: FALSE Page Ref: 462 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies 17) The advantages of employee use of mobile systems at work include cost savings and greater employee satisfaction. Answer: TRUE Page Ref: 463 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies 18) The disadvantages of employee use of mobile systems at work include lower productivity and greater need for training. Answer: FALSE Page Ref: 463 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies
10 Copyright © 2014 Pearson Education, Inc.
19) If the organization wants to own any mobile device that employees connect to its network, the policy must be a part of the employee's contract. Answer: TRUE Page Ref: 464 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies Essay 1) What are mobile systems? Answer: Mobile systems are information systems that support users in motion. Mobile systems users access the system from any place—at home, at work, in the car, on the bus, or at the beach—using any smart device, such as smartphone, tablet, or PC. The possibilities are endless. Mobile systems users move not only geographically; they also move from device to device. The major elements in a mobile system are users in motion, mobile devices, wireless connectivity, and cloud-based resources. Page Ref: 450 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the major types of computer hardware and software used by companies 2) What is just-in-time data? Answer: Mobile systems offer just-in-time data, which is data delivered to the user at the precise time it is needed. Just-in-time data removes the premium on the ability to memorize vast quantities of product data, but creates a premium for the ability to access, query, and present that data. Mobile systems increase the speed of business, giving an advantage to those who can nimbly respond to changing conditions and succeed with the unexpected. Page Ref: 453 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the major types of computer hardware and software used by companies
11 Copyright © 2014 Pearson Education, Inc.
3) Differentiate between native and thin-client mobile applications. Answer: Native mobile applications are developed using serious, heavy-duty, professional programming languages, such as Objective-C, Java, and VB.Net. All of these languages are object-oriented, which means they can be used to create difficult, complex applications, and, if used properly, will result in high-performance code that is easy to alter when requirements change. Object-oriented languages can only be used by professional programmers who have devoted years to learning object-oriented design and coding skills. The downside of native applications is that they only run on the operating system for which they are programmed. As a general rule, the cost of native applications is high. Thin-client development languages are HTML5, CSS3, and Java Script. These are not objectoriented languages and hence are much easier to learn to use. Thin-client applications can be written by professional programmers. However, it is possible for technically oriented Web developers and business professionals to develop them as well. Thin-client applications are limited by the capabilities of the browser. While browsers are becoming increasingly sophisticated, they cannot offer the full capabilities of the underlying operating system and hardware. The major advantage of thin-clients over native applications is that they will run on any operating system and mobile device. Page Ref: 454-458 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the major types of computer hardware and software used by companies 4) State the primary characteristics of a quality mobile application. Answer: The following are the primary characteristics of a quality mobile application: 1. Feature content and support direct interaction 2. Use context-sensitive chrome when needed 3. Provide animation and lively behavior 4. Design to scale and share (display and data) 5. Use the cloud Page Ref: 458 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the major types of computer hardware and software used by companies
12 Copyright © 2014 Pearson Education, Inc.
5) State the advantages and disadvantages of employee use of mobile systems at work. Answer: The advantages of employee use of mobile systems at work include cost savings, as well as greater employee satisfaction of using devices that the employees chose according to their own preferences rather than organization-supplied PCs. Because employees are already using these devices for their own purposes, they need less training and can be more productive. All of this means reduced support costs. On the other hand, employee use of mobile devices has significant disadvantages. There is the real danger of lost or damaged data. When data is brought into employee-owned computing devices, the organization loses control over where it goes or what happens to it. Organizations also lose control over the updating of software and the applications that users employ. This control loss leads to compatibility problems as well. Possibly the greatest disadvantage of employee use of their own devices is the risk of infection. Page Ref: 463 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the major types of computer hardware and software used by companies
13 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 8: Functional Applications Multiple Choice 1) ________ is the computer program component within a functional IS. A) Functional application B) Functional software C) Functional database D) Functional operation Answer: A Page Ref: 468 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 2) ________ applications include those used to send both postal mail and email. A) Lead-generation B) Lead-tracking C) Data-generation D) Product-tracking Answer: A Page Ref: 469 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 3) ________ applications record lead data and product interests, and keep records of customer contacts. A) Lead-generation B) Lead-tracking C) Prospect-generation D) Product-tracking Answer: B Page Ref: 469 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems
1 Copyright © 2014 Pearson Education, Inc.
4) Which of the following is a function of the sales forecasting module of sales and marketing applications? A) tracking product interests B) managing product life cycle C) tracking variances over time D) assessing product success in market segments Answer: C Page Ref: 470 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 5) Which of the following is a function of the customer management module of sales and marketing applications? A) tracking product interests B) recording individual sales projections C) tracking variances over time D) assessing market segments Answer: A Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 6) Which of the following is a function of the product and brand management module of sales and marketing applications? A) tracking product interests B) managing product life cycle C) tracking variances over time D) recording individual sales projections Answer: B Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems
2 Copyright © 2014 Pearson Education, Inc.
7) Which of the following is a function of operations applications? A) tracking the order through fulfillment B) creating and maintaining bill of materials C) recording individual sales projections D) tracking product interests of customers Answer: A Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 8) Which of the following is a function of the order entry module of operations applications? A) tracking order through fulfillment B) recording payment method C) controlling inventory D) informing customers of order status Answer: B Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 9) Which of the following is a function of the order management module of operations applications? A) tracking order through fulfillment B) recording payment method C) controlling inventory D) entering order for processing Answer: A Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following is a function of the finished-goods inventory management module of operations applications? A) tracking order through fulfillment B) recording payment method C) controlling inventory D) entering order for processing Answer: C Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 11) Which of the following is a function of the customer service module of operations applications? A) scheduling shipping B) recording payment method C) controlling inventory D) providing self-help via Web Answer: D Page Ref: 471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Compare and contrast different business intelligence systems 12) Which of the following is a function of the inventory application of manufacturing? A) supporting/evaluating policy B) creating and maintaining bill of materials C) scheduling and controlling machines in accordance with production schedules D) creating and maintaining master production schedules Answer: A Page Ref: 472 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following is a function of the manufacturing-planning application? A) supporting/evaluating policy B) creating and maintaining bill of materials C) scheduling and controlling machines in accordance with production schedules D) creating and maintaining master production schedules Answer: B Page Ref: 472 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 14) Which of the following is a function of the manufacturing-scheduling application? A) supporting/evaluating policy B) creating and maintaining bill of materials C) scheduling and controlling machines in accordance with production schedules D) creating and maintaining master production schedules Answer: D Page Ref: 472 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 15) The process by which the company analyzes past sales levels and makes estimates of future sales is called a(n) ________. A) push manufacturing process B) pull manufacturing process C) inbound manufacturing process D) outbound manufacturing process Answer: A Page Ref: 474 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
5 Copyright © 2014 Pearson Education, Inc.
16) ________ is an application that plans the need for materials and inventories of materials used in the manufacturing process. A) Enterprise resource planning B) Product inventory planning C) Materials requirements planning D) Materials delivery planning Answer: C Page Ref: 474 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 17) Which of the following is referred to as MRP II? A) manufacturing resource planning B) materials requirements planning C) materials resource planning D) manufacturing requirements planning Answer: A Page Ref: 474 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems 18) Which of the following is a function of the manufacturing operations application? A) supporting/evaluating policy B) creating and maintaining bill of materials C) scheduling and controlling machines in accordance with production schedules D) creating and maintaining master production schedule Answer: C Page Ref: 475 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Compare and contrast different business intelligence systems
6 Copyright © 2014 Pearson Education, Inc.
19) Which of the following is a function of human resources applications? A) performance evaluation B) maintaining credit status C) tracking product interests D) maintaining history of contacts Answer: A Page Ref: 475 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 20) Which of the following is a function of accounting applications? A) validating payment method B) managing retained earnings C) creating and maintaining bill of materials D) verifying customer credit Answer: B Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different business intelligence systems 21) The treasury management module of the accounting application ________. A) helps the company manage inflows and outflows of cash B) tracks amounts owed to the company by its customers and manages collections C) assists management in quantifying goals for revenues and expenses D) manages retained earnings, dividends payments, and long-term financing Answer: D Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different business intelligence systems 22) The accounts payable module of the accounting application ________. A) helps the company manage inflows and outflows of cash B) tracks amounts owed by the company to its customers and schedules payments C) assists management in quantifying goals for revenues and expenses D) tracks amounts owed to the company by its customers Answer: B Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different business intelligence systems 7 Copyright © 2014 Pearson Education, Inc.
23) The accounts receivable module of the accounting application ________. A) helps the company manage inflows and outflows of cash B) tracks amounts owed by the company to its customers and manages collections C) assists management in quantifying goals for revenues and expenses D) tracks amounts owed to the company by its customers Answer: D Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes 24) The cost accounting module of the accounting application ________. A) determines, for internal users, how much it costs the company to provide specific products or services B) keeps records and reports financial results to investors, creditors, and other external users C) assists management in quantifying goals for revenues and expenses D) manages retained earnings, dividends payments, and long-term financing Answer: A Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes 25) The budgeting module of the accounting application ________. A) shows balances in all asset, liability, and equity accounts B) keeps records and reports financial results to investors, creditors, and other external users C) assists management in quantifying goals for revenues and expenses D) manages retained earnings, dividends payments, and long-term financing Answer: C Page Ref: 476 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Compare and contrast different business intelligence systems True or False 1) Functional systems support a single organizational function. Answer: TRUE Page Ref: 468 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 8 Copyright © 2014 Pearson Education, Inc.
2) The sales lead-tracking IS is an example of a functional system. Answer: TRUE Page Ref: 468 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) Prospect-generation applications are also known as lead-tracking applications. Answer: FALSE Page Ref: 469 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 4) Tracking product interests is a function of the customer management module of sales and marketing applications. Answer: TRUE Page Ref: 470 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 5) Managing customers is not a function of the sales department. Answer: FALSE Page Ref: 469 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 6) Obtaining sales results from order processing or receivables applications is a function of the product and brand management module of sales and marketing applications. Answer: TRUE Page Ref: 471 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
9 Copyright © 2014 Pearson Education, Inc.
7) Operations applications are particularly prominent for non manufacturers such as wholesalers and retailers. Answer: TRUE Page Ref: 471 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 8) Tracking an order through fulfillment is a function of the order entry module of operations applications. Answer: FALSE Page Ref: 471 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 9) Supporting and evaluating policy is a function of the finished-goods inventory management module of operations applications. Answer: TRUE Page Ref: 471 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 10) Inventory tracking requires that items be identified by a number. Answer: TRUE Page Ref: 472 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 11) Just-in-time (JIT) inventory policy is adopted by companies that view inventories as assets. Answer: FALSE Page Ref: 473 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
10 Copyright © 2014 Pearson Education, Inc.
12) A bill of materials (BOM) refers to the total budget of manufacturing a specific product. Answer: FALSE Page Ref: 473 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 13) Creating and maintaining bill of materials is a function of the manufacturing operations application. Answer: FALSE Page Ref: 472 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 14) Creating and maintaining master production schedule is a function of the manufacturingscheduling application. Answer: TRUE Page Ref: 472 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 15) Master production schedule (MPS) is an example of the pull manufacturing process. Answer: FALSE Page Ref: 474 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 16) Materials requirements planning is referred to as MRP II. Answer: FALSE Page Ref: 474 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
11 Copyright © 2014 Pearson Education, Inc.
17) Compensation activities support retirement plans, company stock purchases, and stock options and grants. Answer: TRUE Page Ref: 475 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 18) Employee assessment includes the publication of standard job and skill descriptions as well as support for employee performance evaluations. Answer: TRUE Page Ref: 475 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 19) Accounts receivable applications include features to reconcile payments against purchases. Answer: FALSE Page Ref: 476 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes Essay 1) What are functional systems and functional applications? Answer: Functional systems are information systems that support a single organizational function. Examples are the accounts payable IS, the sales lead-tracking IS, and the customer support IS. Functional IS do not cross departmental or organizational boundaries. A functional application is a computer program component within a functional IS. Few organizations develop their own functional applications. Instead, most license functional application software from a vendor and then adapt. Page Ref: 468 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
12 Copyright © 2014 Pearson Education, Inc.
2) Explain the major functions of sales and marketing applications. Answer: The primary purpose of the sales process is to find prospects and transform them into customers by selling them something. Sales departments also manage existing customers, which is a euphemism for selling existing customers more products. Other functional sales activities forecast future sales. In marketing, systems exist to manage products and brands. Companies use such systems to assess the effectiveness of marketing messages, advertising, and promotions and to determine product demand among various market segments. Page Ref: 469-471 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 3) Explain the functions of the order entry and order management modules of operations applications. Answer: Order entry applications record customer purchases. Typically, an order entry application obtains customer contact and shipping data, verifies customer credit, validates payment method, and enters the order into a queue for processing. Order management applications track the order through the fulfillment process, arrange for and schedule shipping, and process exceptions (such as out-of-stock products). Order management applications inform customers of order status and scheduled delivery dates. Page Ref: 471-472 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 4) Explain the just-in-time (JIT) inventory policy. Answer: Many companies view inventories primarily as liabilities. In this view, companies seek to keep inventories as small as possible and to eliminate them completely if possible. This goal can be achieved by using the just-in-time (JIT) inventory policy. This policy seeks to have production inputs (both raw materials and work-in-process) delivered to the manufacturing site just as they are needed. By scheduling delivery of inputs in this way, companies are able to reduce inventories to a minimum. Page Ref: 473 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
13 Copyright © 2014 Pearson Education, Inc.
5) What are the functions of modern human resources (HR) applications? How do they differ from first-era HR applications? Answer: Human resources applications support recruitment, compensation, assessment, development and training, and planning. The first-era human resources (HR) applications did little more than compute payroll. Modern HR applications concern all dimensions of HR activity including job postings, payroll calculations, performance evaluations, staff planning, and training. Page Ref: 475 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Compare and contrast different business intelligence systems 6) What are the major functions of accounting applications? Answer: Typical accounting applications are treasury management, general ledger activities, cash management, accounts payable, accounts receivable, financial reporting, cost accounting, and budgeting. Page Ref: 476 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supporting business processes
14 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 9: Enterprise Resource Planning (ERP) Systems Multiple Choice 1) ________ is a suite of applications, called modules, a database, and a set of inherent processes for consolidating business operations into a single, consistent, computing platform. A) Enterprise resource planning B) Customer relationship management C) Warehouse management system D) Supply chain management Answer: A Page Ref: 479 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 2) Which of the following is an example of a supply chain activity? A) scheduling B) sales prospecting C) procurement D) cash management Answer: C Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 3) For a product to be considered a true ERP product, it must include applications that integrate manufacturing activities such as ________. A) inventory management B) quality control C) customer support D) benefits administration Answer: B Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
1 Copyright © 2014 Pearson Education, Inc.
4) CRM, as an application that must be included in a true ERP product, includes ________. A) quality control B) commission calculations C) sales prospecting D) supplier management Answer: C Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 5) Payroll, time and attendance, and benefits administration are examples of ________ activities. A) manufacturing B) CRM C) human resources D) accounting Answer: C Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 6) Maintaining a general ledger is an example of a(n) ________ activity. A) supply chain B) accounting C) human resources D) manufacturing Answer: B Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
2 Copyright © 2014 Pearson Education, Inc.
7) Which of the following is true of ERP application programs? A) During the ERP development process, the development team sets configuration parameters that specify how ERP application programs will operate. B) There are virtually no limits to how much configuration can be done in an ERP application program. C) Custom programming of ERP application programs is economical both initially and in longterm maintenance costs. D) In order to meet varying customer requirements, development teams have to change the program code of ERP application programs. Answer: A Page Ref: 482 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 8) Which of the following is true of ERP databases? A) An ERP database contains the company's operational data. B) A stored procedure is a computer program code stored within the database that runs to keep the database consistent when certain conditions arise. C) An ERP solution includes initial configuration data. D) A trigger is a computer program code stored in the database that is used to enforce business rules. Answer: C Page Ref: 483 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 9) A trigger is a ________. A) computer program stored within the database that runs to keep the database consistent when certain conditions arise B) computer program stored in the database that is used to enforce business rules C) set of inherent procedures in an ERP solution that implement standard business processes D) programming paradigm that describes computation in terms of statements that change a program state Answer: A Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
3 Copyright © 2014 Pearson Education, Inc.
10) What is a stored procedure? A) It is a computer program stored within the database that runs to keep the database consistent when certain conditions arise. B) It is a programming paradigm that describes computation in terms of statements that change a program state. C) It is a computer program stored in the database that is used to enforce business rules. D) It is a software program that houses and serves business logic for use by multiple applications. Answer: C Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 11) Which of the following should be considered while implementing the ERP application? A) compare as-is model to blueprint processes B) convert to new procedures C) model current processes "as-is" D) identify relevant ERP blueprint processes Answer: B Page Ref: 485 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 12) Which of the following factors forms a major point of difference between companies of different sizes, in terms of ERP? A) relevance of ERP systems B) value chains C) availability of skilled IT staff D) basic business processes Answer: C Page Ref: 487 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following is true of the impact of ERP on small organizations? A) IT specialists in small organizations are dedicated to managing only the ERP system. B) The IT staff in small organizations is isolated from senior management. C) In small organizations, ERP implementation will be part of a strategic process and, once begun, will have the full backing of the entire executive group. D) IT specialists in small organizations are spread very thin and often are in over their heads during an ERP implementation. Answer: D Page Ref: 487 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 14) Which of the following sentences about the effect of ERP on midsized organizations is true? A) In midsized organizations, the IT staff is isolated from senior management. B) ERP implementation in midsized companies will be part of a strategic process and, once begun, will have the full backing of the entire executive group. C) IT specialists in midsized organizations are spread very thin and often are in over their heads during an ERP implementation. D) Midsized organizations employ only one or two IT specialists. Answer: A Page Ref: 487 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 15) ________ is known primarily for its retail-oriented ERP software. A) Epicor B) SAP C) Infor D) Oracle Answer: A Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following ERP vendors' products have the lowest cost? A) Oracle B) Microsoft Dynamics C) Epicor D) SAP Answer: C Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 17) Which of the following statements is true of Oracle's ERP products? A) Oracle has never been known to create easy-to-use ERP products. B) Oracle traditionally does not develop its ERP products in-house, but favors acquisition of products such as PeopleSoft and Siebel. C) Oracle's ERP products are relatively inexpensive and serve higher-end small companies and lower-end large companies. D) Oracle's ERP products are not designed according to SOA principles, and hence are noncustomizable. Answer: A Page Ref: 490 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 18) Which of the following is true of SAP's ERP products? A) SAP is known primarily for its retail-oriented ERP software. B) SAP's ERP products are lower in cost than those from other companies. C) SAP uses classic, thick-client, client-server architecture. D) Because of its installed base, SAP can make a rapid move to cloud-based solutions. Answer: C Page Ref: 490 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
6 Copyright © 2014 Pearson Education, Inc.
True or False 1) The primary purpose of an ERP system is integration. Answer: TRUE Page Ref: 479 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 2) As an element of an ERP solution, supply chain includes scheduling, capacity planning, quality control, bill of materials, and related activities. Answer: FALSE Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 3) ERP vendors design application programs to be configurable so that development teams can alter them to meet customer requirements without changing program code. Answer: TRUE Page Ref: 482 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 4) An ERP solution includes a database design, initial configuration data, and the company's operational data. Answer: FALSE Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 5) Stored procedure is a computer program stored within the database that runs to keep the database consistent when certain conditions arise. Answer: FALSE Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
7 Copyright © 2014 Pearson Education, Inc.
6) An example of a stored procedure would be never to sell certain items at a discount. Answer: TRUE Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 7) Process blueprints are the inherent processes in an ERP solution that implement standard business processes. Answer: TRUE Page Ref: 483 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 8) When implementing ERP Systems, the first task is to create a model of current business procedures and practices, which is called the as-is model. Answer: TRUE Page Ref: 485 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 9) The differences between as-is processes and the blueprint can be reconciled after the ERP system has been implemented. Answer: FALSE Page Ref: 485 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 10) The ERP implementation process is carried out even as the business continues to run on the old system. Answer: TRUE Page Ref: 485 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
8 Copyright © 2014 Pearson Education, Inc.
11) Departmental managers have the authority to force an ERP implementation. Answer: FALSE Page Ref: 486 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 12) ERP was initially adopted by government and public service agencies to handle complex administrative tasks. Answer: FALSE Page Ref: 486 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 13) Small organizations employ only one or two IT specialists who not only manage the ERP system, but the entire IS department as well. Answer: TRUE Page Ref: 487 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 14) In large organizations, the IT staff is often isolated from senior management. Answer: FALSE Page Ref: 487 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 15) Epicor's lead ERP product is based on a modern software development design pattern called service-oriented architecture. Answer: TRUE Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
9 Copyright © 2014 Pearson Education, Inc.
16) Microsoft relies heavily on its internal salesforce to create customer solutions using the Dynamics platform. Answer: FALSE Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 17) Oracle's ERP products are designed according to SOA principles and hence are adaptable and customizable. Answer: TRUE Page Ref: 490 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 18) SAP's ERP products are lower in cost than those from other companies. Answer: FALSE Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning Essay 1) What is the primary purpose of an ERP system? Answer: The primary purpose of an ERP system is integration. An ERP system allows the left hand of the organization to know what the right hand is doing. This integration allows real-time updates, globally, whenever and wherever a transaction takes place. Critical business decisions can then be made on a timely basis using the latest data. Page Ref: 479 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
10 Copyright © 2014 Pearson Education, Inc.
2) Explain ERP application programs. Answer: ERP vendors design application programs to be configurable so that development teams can alter them to meet customer requirements without changing program code. Accordingly, during the ERP development process, the development team sets configuration parameters that specify how ERP application programs will operate. There are limits to how much configuration can be done. If a new ERP customer has requirements that cannot be met via program configuration, then it either needs to adapt its business to what the software can do or write (or pay another vendor to write) application code to meet its requirement. Thus, choosing an ERP solution that has applications that function close to the organization's requirements is critically important to success. Page Ref: 482 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 3) Explain briefly the steps for implementing ERP systems. Answer: The first task in implementing ERP systems is to create a model of current business procedures and practices, which is called the as-is model. Managers and analysts then compare those as-is processes to the ERP process blueprints and note differences. The company then must find ways to eliminate the differences, either by changing the existing business process to match the ERP process or by altering the ERP system. Once the differences between as-is processes and the blueprint have been reconciled, the next step is to implement the system. Before implementation starts, however, users must be trained on the new processes, procedures, and use of the ERP system's features and function. Additionally, the company needs to conduct a simulation test of the new system to identify problems. Then, the organization must convert its data, procedures, and personnel to the new ERP system. All of this happens while the business continues to run on the old system. Page Ref: 485-486 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
11 Copyright © 2014 Pearson Education, Inc.
4) Explain how organizations of different sizes use ERP differently. Answer: Companies of different sizes have one very important difference that has a major impact on ERP: the availability of skilled IT personnel. Small organizations employ only one or two IT specialists who not only manage the ERP system, but the entire IS department as well. They are spread very thin and often are in over their heads during an ERP implementation. Smaller, simpler ERP solutions are common among these companies. Midsized organizations expand IT from one person to a small staff, but frequently this staff is isolated from senior management. Such isolation creates misunderstanding and distrust. Because of the expense, organizational disruption, and length of ERP projects, senior management must be committed to the ERP solution. When IT management is isolated, such commitment is difficult to obtain and may not be strong. This issue is so prevalent that many ERP consultants say the first step in moving toward ERP is to obtain deep senior-level management commitment to the project. Large organizations have a full IT staff that is headed by the chief information officer (CIO), who is a business and IT professional who sits on the executive board and is an active participant in organizational strategic planning. ERP implementation will be part of that strategic process and, once begun, will have the full backing of the entire executive group. Page Ref: 486-487 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning 5) Give a brief description of Epicor's ERP products. Answer: Epicor is known primarily for its retail-oriented ERP software, although it is broadening its penetration in other industry segments. Its lead ERP product, Epicor 9, is based on a modern software development design pattern called service-oriented architecture (SOA). SOA enables cost-effective application flexibility and allows organizations to connect their application programs with Epicor 9 in highly customizable ways. Epicor's products are lower in cost than those from other companies. Page Ref: 489 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Describe the uses of enterprise systems and enterprise resource planning
12 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 10: Supply Chain Management Multiple Choice 1) Which of the following is an example of interorganizational process? A) sales force automation system B) enterprise resource planning system C) Automated Clearing House system among banks D) customer relationship management system Answer: C Page Ref: 494 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 2) Which of the following refers to a network of organizations and facilities that transforms raw materials into products delivered to customers? A) supply chain B) distribution channel C) strategic business unit D) collaboration system Answer: A Page Ref: 494 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 3) In a supply chain, distributors order products from ________. A) retailers B) manufacturers C) customers D) suppliers Answer: B Page Ref: 494 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance
1 Copyright © 2014 Pearson Education, Inc.
4) Which of the following statements about supply chains is correct? A) Supply chains consist only of customers, retailers, distributors, manufacturers, and suppliers. B) Not every supply chain has distributors and retailers. C) Each element in the supply chain is connected to only one entity up and down. D) The only source of revenue in a supply chain is the retailer. Answer: B Page Ref: 495 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 5) The four major drivers that affect supply chain performance are ________. A) suppliers, inventory, distributors, and information B) facilities, working capital, transportation, and storage C) suppliers, facilities, transportation, and distribution D) facilities, inventory, transportation, and information Answer: D Page Ref: 496 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 6) Which of the following is an example of inventory? A) machinery B) factories C) raw materials D) capital Answer: C Page Ref: 496 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 7) Which of the following statements about inventory is true? A) Managing an inventory requires balancing between availability and cost. B) Inventory includes raw materials and excludes finished goods. C) Inventory management decisions are limited to the size of the inventory. D) Managing inventory focuses on order frequency and not the size of reorders. Answer: A Page Ref: 496 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 2 Copyright © 2014 Pearson Education, Inc.
8) The three factors of information related to the supply chain are ________. A) source, channel, and receiver B) purpose, availability, and means C) source, purpose, and outcome D) purpose, means, and outcome Answer: B Page Ref: 497 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 9) The ________ of information can be transactional, such as orders and order returns, or it can be informational, such as the sharing of inventory and customer order data. A) purpose B) means C) availability D) direction Answer: A Page Ref: 497 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 10) Which of the following refers to the way organizations share their information? A) means B) purpose C) availability D) intent Answer: C Page Ref: 497 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance
3 Copyright © 2014 Pearson Education, Inc.
11) ________ refers to the methods by which information is transmitted. A) Direction B) Means C) Purpose D) Availability Answer: B Page Ref: 497 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 12) ________ is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. A) Supply chain sustainability B) Supply chain optimization C) Supply chain profitability D) Supply chain analytics Answer: C Page Ref: 497 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supply chain management and performance 13) The phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain is referred to as the ________. A) synergistic effect B) flanging effect C) stack effect D) bullwhip effect Answer: D Page Ref: 498 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance
4 Copyright © 2014 Pearson Education, Inc.
14) Which of the following is true about the bullwhip effect? A) Small changes in demand at the supplier are amplified at each stage of the supply chain. B) It is a natural dynamic that occurs because of the multistage nature of the supply chain. C) It is strongly associated with erratic consumer demand. D) It increases the overall profitability of the supply chain. Answer: B Page Ref: 499 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 15) Because of the nature of the bullwhip effect, ________ face maximum variation in demand. A) suppliers B) manufacturers C) distributors D) retailers Answer: A Page Ref: 499 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 16) The ________ is used as the measure of supply chain speed. A) dollar value of goods exchanged in a given period of time B) amount of goods exchanged in a given period of time C) total profit generated by the components of supply chain D) time taken to transport goods from one component to another Answer: A Page Ref: 499 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supply chain management and performance 17) Information systems ________. A) reduce the supply chain speed B) only partially eliminate the bullwhip effect C) reduce the cost of inventories but increase their size D) do not optimize supply chain profitability Answer: D Page Ref: 502 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supply chain management and performance 5 Copyright © 2014 Pearson Education, Inc.
True or False 1) An interorganizational system is one in which process activities occur in two or more independent organizations. Answer: TRUE Page Ref: 494 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 2) The Automated Clearing House system among banks is an example of an interorganizational system. Answer: TRUE Page Ref: 494 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance 3) Every supply chain has four basic components: suppliers, manufacturers, distributors, and retailers. Answer: FALSE Page Ref: 494-495 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 4) In the term supply chain, each organization is connected to just one company up (toward the supplier) and down (toward the customer) the chain. Answer: FALSE Page Ref: 495 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 5) All supply chains have distributors and retailers. Answer: FALSE Page Ref: 495 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 6 Copyright © 2014 Pearson Education, Inc.
6) The only source of revenue in the supply chain is the customer. Answer: TRUE Page Ref: 495 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supply chain management and performance 7) As a factor affecting supply chain performance, facilities concern the location, size, and operations methodology of the places where products are fabricated, assembled, or stored. Answer: TRUE Page Ref: 496 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 8) Raw materials are not considered as inventory in the supply chain. Answer: FALSE Page Ref: 496 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 9) Supply chain profitability is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. Answer: TRUE Page Ref: 497 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supply chain management and performance 10) Profitability of the supply chain can be maximized only if all the organizations in the supply chain operate at their maximum profitability. Answer: FALSE Page Ref: 497 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supply chain management and performance
7 Copyright © 2014 Pearson Education, Inc.
11) The bullwhip effect reveals that retailers face the highest variations in demand. Answer: FALSE Page Ref: 498 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 12) The bullwhip effect explains the amplification of demand at various stages of the supply chain. Answer: TRUE Page Ref: 499 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 13) Erratic consumer demand is the major reason for the bullwhip effect. Answer: FALSE Page Ref: 499 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 14) The bullwhip effect helps to increase the overall profitability of the supply chain. Answer: FALSE Page Ref: 499 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 15) The bullwhip effect can be reduced by giving all participants in the supply chain access to consumer-demand information from the retailer. Answer: TRUE Page Ref: 499 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance
8 Copyright © 2014 Pearson Education, Inc.
16) True demand is the demand from the only party that introduces money into the system. Answer: TRUE Page Ref: 499 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 17) Supply chain speed refers to the dollar value of goods exchanged in a given period of time. Answer: TRUE Page Ref: 499 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supply chain management and performance 18) Use of information systems can increase the bullwhip effect. Answer: FALSE Page Ref: 499 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supply chain management and performance Essay 1) What are interorganizational business systems? Answer: An interorganizational system is one in which process activities occur in two or more independent organizations. Interorganizational processes vary in scope and complexity. An example of a simple interorganizational system is a sales process at a small retailer in which the retailer processes customers' credit card transactions. The retailer, customer, and credit card company (and possibly the bank that issued the card) are all part of the business system that processes the payment. Page Ref: 494 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supply chain management and performance
9 Copyright © 2014 Pearson Education, Inc.
2) What is a supply chain? What are the four drivers that are crucial to the success of supply chain? Answer: A supply chain is a network of organizations and facilities that transform raw materials into products delivered to customers. In a typical supply chain, customers order from retailers, who, in turn, order from distributors, who, in turn, order from manufacturers, who, in turn, order from suppliers. Studies have found that the location and size of the facilities in the supply chain is one driver. Another is the size of the supplier's inventory and how well it is managed. The third driver is how well the various modes of transportation are routed and utilized. From a systems point of view, the way information is used in the supply chain is the fourth and most important driver. Page Ref: 494-497 Difficulty: Moderate Study Question: Study Question 2, 3 Learning Outcome: Discuss the role of information systems in supply chain management and performance 3) Define supply chain profitability. How is it different from individual organizational profitability? Answer: Supply chain profitability is the difference between the sum of the revenue generated by the supply chain and the sum of the costs that all organizations in the supply chain incur to obtain that revenue. In general, the maximum profit to the supply chain will not occur if each organization in the supply chain maximizes its own profits in isolation. Usually, the profitability of the supply chain increases if one or more of the organizations operate at less than their own maximum profitability. Page Ref: 497-498 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supply chain management and performance
10 Copyright © 2014 Pearson Education, Inc.
4) Explain the bullwhip effect with an example. Answer: The bullwhip effect is a phenomenon in which the variability in the size and timing of orders increases at each stage up the supply chain, from customer to supplier. In a famous study, the bullwhip effect was observed in Procter & Gamble's supply chain for diapers. The number of babies determines diaper demand, and that number is constant or possibly slowly changing. Retailers do not order from the distributor with the sale of every diaper package. The retailer waits until the diaper inventory falls below a certain level, called the reorder quantity. Then the retailer orders a supply of diapers, perhaps ordering a few more than it expects to sell to ensure that it does not have an outage. The distributor receives the retailer's orders and follows the same process. It waits until its supply falls below the reorder quantity, and then it reorders from the manufacturer, with perhaps an increased amount to prevent outages. The manufacturer, in turn, uses a similar process with the raw-materials suppliers. Because of the nature of this process, small changes in demand at the retailer are amplified at each stage of the supply chain. These small changes become quite large variations on the supplier end. The large fluctuations of the bullwhip effect force distributors, manufacturers, and suppliers to carry larger inventories than should be necessary to meet the real consumer demand. Thus, the bullwhip effect reduces the overall profitability of the supply chain. Page Ref: 498-499 Difficulty: Moderate Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supply chain management and performance 5) How do information systems affect supply chain performance? Answer: Information systems such as CRM and e-commerce sales systems have dramatically reduced the costs of buying and selling. Sourcing, buying, and selling have all become faster, easier, more effective, and less costly. Distribution systems in the cloud have enabled businesses to integrate their information systems with less cost and greater speed and agility than ever before. The presence of information systems has also expanded supply chain speed. Information systems have enabled both suppliers and customers to reduce the size of their inventories and, thus, reduce their inventory costs. Information systems also have the ability to eliminate the bullwhip effect. Page Ref: 499 Difficulty: Moderate Study Question: Study Question 6 Learning Outcome: Discuss the role of information systems in supply chain management and performance
11 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 11: Hyper-Social Organizations and Knowledge Management Multiple Choice 1) Which of the following is true of hyper-social organizations? A) Using social media in an old-style, organization-centric manner is highly effective. B) Rather than creating relationships in which customers and organizations perceive and gain value, they send messages that attempt to manage, influence and control both parties. C) They are organizations that have made the four transitions, called pillars. D) Marketing is broadly conceived to pertain to employees and partners only. Answer: C Page Ref: 505 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) Which of the following is true of the transition of channels to networks in a hyper-social organization? A) Hyper-social organizations use networks to transmit messages valued by recipients. B) Networks transmit data, whereas channels transmit knowledge. C) Social media limits the formation of communities based on common interests. D) In order to obtain any of the consumers' attention today, organizations must engage with networks in their communities, based on their interests. Answer: D Page Ref: 507 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
1 Copyright © 2014 Pearson Education, Inc.
3) Which of the following dynamic process activities involves determining what the communities you care about are saying about you, and identifying the structure, goals, and dynamic of communities with which you want to relate? A) activate B) sense C) measure D) engage Answer: B Page Ref: 508 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 4) Which of the following dynamic process activities involves creating relationships with different communities? A) activate B) sense C) measure D) engage Answer: D Page Ref: 508 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) Which of the following dynamic process activities involves connecting communities to internal value chains and processes? A) activate B) sense C) measure D) engage Answer: A Page Ref: 507 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
2 Copyright © 2014 Pearson Education, Inc.
6) Which of the following dynamic process activities involves analyzing the success of an organization in terms of social capital? A) activate B) sense C) measure D) engage Answer: C Page Ref: 507 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 7) Which of the following dynamic process activities involves publicizing community successes? A) sense B) activate C) engage D) story tell Answer: D Page Ref: 507 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) The process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital is referred to as ________. A) knowledge management B) value engineering C) knowledge engineering D) earned value management Answer: A Page Ref: 509 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
3 Copyright © 2014 Pearson Education, Inc.
9) ________ are rule-based systems that encode human knowledge in the form of If/Then rules. A) Management information systems B) Expert systems C) Content management systems D) Decision support systems Answer: B Page Ref: 510 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) The programs that process a set of rules are called ________. A) expert systems codes B) expert systems databases C) expert systems shells D) expert systems files Answer: C Page Ref: 511 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) Which of the following is true of expert systems? A) To create the system of rules, the expert system development team interviews human experts in the domain of interest. B) The programs that process a set of rules are called expert systems codes. C) Expert systems are easy to maintain. D) Expert systems require very few labor hours from both experts in the domain under study and designers of expert systems. Answer: A Page Ref: 511 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
4 Copyright © 2014 Pearson Education, Inc.
12) ________ are information systems that support the management and delivery of documents and other expressions of employee knowledge. A) Management information systems B) Enterprise resource systems C) Expert systems D) Content management systems Answer: D Page Ref: 511 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 13) Which of the following is one of the complications of a content management function? A) Multiple documents cannot refer to the same product or procedure. B) Documents exist in isolation from each other. C) Content management systems must maintain linkages among documents. D) The document contents are nonperishable. Answer: C Page Ref: 512 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) Which of the following is true of the content management application alternatives? A) In-house systems are far less expensive to maintain than off-the-shelf products. B) Operations develop an in-house system to track machine maintenance procedures. C) Custom content management applications are economical to develop and maintain. D) Off-the-shelf products have considerably less functionality than most in-house systems. Answer: B Page Ref: 512-513 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
15) The largest collection of documents ever assembled exists on the Internet, and the world's largest and most popular document search engine is ________. A) Yahoo B) Bing C) Google D) AltaVista Answer: C Page Ref: 513 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 16) ________ wikis are particularly useful for technical teams, such as engineering teams, who need to share common definitions for terms and principles. A) Nonlinear B) Linear C) Public D) Private Answer: D Page Ref: 514 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) A(n) ________ is an employee directory that includes not only the standard name, email, phone, and address, but also organizational structure and expertise. A) rich directory B) active directory C) external directory D) internal directory Answer: A Page Ref: 514 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
6 Copyright © 2014 Pearson Education, Inc.
True or False 1) Rather than creating relationships in which both customers and the organization perceive and gain value, hyper-social organizations send messages that attempt to manage, influence, and control both parties. Answer: FALSE Page Ref: 505 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) The concepts and language of the hyper-social organization model are market-oriented. Answer: TRUE Page Ref: 505 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) Social media enables people to form communities based on common interests. Answer: TRUE Page Ref: 507 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 4) Channels transmit knowledge, whereas networks transmit data. Answer: FALSE Page Ref: 507 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 5) Sensing involves identifying the structure, goals, and dynamic of communities with which you want to relate. Answer: TRUE Page Ref: 508 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
7 Copyright © 2014 Pearson Education, Inc.
6) Engaging involves connecting communities to your internal value chains and processes. Answer: FALSE Page Ref: 508 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 7) Knowledge management improves customer service by streamlining response time. Answer: TRUE Page Ref: 509-510 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 8) Knowledge management boosts revenues by getting products and services to market faster. Answer: TRUE Page Ref: 509-510 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) Content management systems are rule-based systems that encode human knowledge in the form of If/Then rules. Answer: FALSE Page Ref: 510 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) Expert systems are easy to maintain. Answer: FALSE Page Ref: 511 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
11) The documents in content management systems do not exist in isolation from each other. Answer: TRUE Page Ref: 512 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) The documents in content management systems are nonperishable. Answer: FALSE Page Ref: 512 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 13) Custom content management applications are expensive to develop and maintain. Answer: TRUE Page Ref: 512 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) Most in-house systems have considerably more functionality than off-the-shelf products and they are far less expensive to maintain. Answer: FALSE Page Ref: 513 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) The largest collection of documents ever assembled exists on the Internet, and the world's best known document search engine is Google. Answer: TRUE Page Ref: 513 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
16) An active directory is an employee directory that includes not only the standard name, email, phone, and address, but also organizational structure and expertise. Answer: TRUE Page Ref: 514 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) Rich directories are particularly useful in large organizations where people with particular expertise are unknown. Answer: TRUE Page Ref: 515 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects Essay 1) What are the characteristics of a hyper-social organization? Answer: A hyper-social organization is an organization that uses social media to transform its interactions with customers, employees, and partners into mutually satisfying relationships with them and their communities. Rather than sending messages that attempt to manage, influence, and control, hyper-social organizations create relationships in which both parties perceive and gain value. In particular, a hyper-social organization is one that has made the four transitions, called pillars. The concepts and language of this model are marketing-oriented, but in this model marketing is broadly conceived to pertain to employees and partners as well as customers. Page Ref: 505 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes
10 Copyright © 2014 Pearson Education, Inc.
2) What is knowledge management? How does it benefit an organization? Answer: Knowledge management (KM) is the process of creating value from intellectual capital and sharing that knowledge with employees, managers, suppliers, customers, and others who need that capital. The following are the primary benefits of KM: 1. KM fosters innovation by encouraging the free flow of ideas. 2. KM improves customer service by streamlining response time. 3. KM boosts revenues by getting products and services to market faster. 4. KM enhances employee retention rates by recognizing the value of employees' knowledge and rewarding them for it. 5. KM streamlines operations and reduces costs by eliminating redundant or unnecessary processes. In addition, KM preserves organizational memory by capturing and storing the lessons learned and best practices of key employees. Page Ref: 509-510 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) What are expert systems? Answer: Expert systems are rule-based systems that encode human knowledge in the form of If/Then rules. Such rules are statements that specify if a particular condition exists, then to take some action. The programs that process a set of rules are called expert systems shells. Typically, the shell processes rules until no value changes. At that point, the values of all the variables are reported as results. To create the system of rules, the expert system development team interviews human experts in the domain of interest. Expert systems are difficult to maintain. Page Ref: 510-511 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
11 Copyright © 2014 Pearson Education, Inc.
4) What are content management systems? Define any three challenges of content management. Answer: Content management systems are information systems that support the management and delivery of documents and other expressions of employee knowledge. Typical users of content management systems are companies that sell complicated products and want to share their knowledge of those products with employees and customers. Content management functions are exceedingly complicated. First, most content databases are huge; some have thousands of individual documents, pages, and graphics. Another complication for content management systems is that documents do not exist in isolation from each other. Documents refer to one another, and multiple documents may refer to the same product or procedure. When one of them changes, others must change as well. Some content management systems maintain linkages among documents so that content dependencies are known and used to maintain document consistency. A third complication is that document contents are perishable. Documents become obsolete and need to be altered, removed, or replaced. Page Ref: 511-512 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) What are content management application alternatives? Answer: Three common alternatives for content management applications are: 1. In-house custom: Operations might develop an in-house system to track machine maintenance procedures. Like all custom applications, however, custom content management applications are expensive to develop and maintain. 2. Off-the-shelf: Because of the expense of custom applications, many organizations today use off-the-shelf software. Some organizations choose vertical market off-the-shelf applications. Offthe-shelf products have considerably more functionality than most in-house systems and they are far less expensive to maintain. 3. Public search engines: The largest collection of documents ever assembled exists on the Internet, and the world's best known document search engine is Google. Because Google searches through all public sites of all organizations, it is usually the fastest and easiest way to find a public document. This often is true even within an organization. Page Ref: 512-514 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
12 Copyright © 2014 Pearson Education, Inc.
6) What is the purpose of a rich directory? Answer: A rich directory is an employee directory that includes not only the standard name, email, phone, and address, but also organizational structure and expertise. With a rich directory, it is possible to determine where in the organization someone works, who is the first common manager among two people, and what past projects and expertise an individual has. For international organizations, such directories also include languages spoken. Microsoft's product Active Directory is the most popular rich directory. Rich directories are particularly useful in large organizations where people with particular expertise are unknown. Page Ref: 514-515 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 6 Learning Outcome: Discuss best practices for using and managing databases
13 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 12: Database Marketing Multiple Choice 1) Which of the following marketing techniques refers to the application of business intelligence systems to the planning and execution of marketing programs? A) ambush marketing B) viral marketing C) database marketing D) guerrilla marketing Answer: C Page Ref: 518 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) ________ is a way of analyzing and ranking customers according to their purchasing patterns. A) Composite forecast B) RFM analysis C) Cooke method D) Delphi technique Answer: B Page Ref: 518 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) Which of the following is the first step in the process of producing an RFM score? A) calculating income from most frequently bought items B) calculating sales of the previous quarter C) sorting customer purchase records by the date of most recent purchase D) verifying customer IDs Answer: C Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) In RFM analysis, an R score of 5 shows that ________. A) the customer has not made recent purchases B) the customer has bought the most expensive item C) the customer has frequently ordered costly items D) the customer has purchased high end items lately Answer: A Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) In RFM analysis, an F score of 1 shows that ________. A) the customer has bought the least expensive item B) the customer has frequently placed an order C) the customer has always bought the most expensive item D) the customer has rarely made a purchase Answer: B Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) In RFM analysis, an M score of ________ shows customers who have bought the least expensive item. A) 2 B) 5 C) 1 D) 4 Answer: B Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
2 Copyright © 2014 Pearson Education, Inc.
7) If a customer has an RFM score of 113, which of the following actions should be implemented by the sales team? A) should attempt to up-sell more expensive goods to this customer B) should contact this customer immediately C) should not waste any time on this customer D) should set up an automated contact system for this customer Answer: A Page Ref: 519 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) An RFM score of ________ means that if this customer goes to the competitor, loss to the company will be minimal. A) 321 B) 333 C) 555 D) 111 Answer: C Page Ref: 519 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) Which of the following RFM scores refer to the most valuable customer? A) 111 B) 555 C) 123 D) 333 Answer: A Page Ref: 519 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following is a data mining technique for determining sales patterns? A) RFM analysis B) market basket analysis C) composite analysis D) Cooke analysis Answer: B Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) In marketing transactions, the fact that customers who buy product X also buy product Y creates a ________ opportunity. A) relationship selling B) cross-selling C) value added selling D) persuasive selling Answer: B Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) In market-basket terminology, ________ is the term used to represent the probability that two items will be purchased together. A) confidence B) support C) cohesion D) assurance Answer: B Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
4 Copyright © 2014 Pearson Education, Inc.
13) In market-basket terminology, a conditional probability estimate is referred to as ________. A) support B) cohesion C) confidence D) chance Answer: C Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 14) In market-basket terminology, the ratio of confidence to the base probability of buying an item is called ________. A) cohesion B) support C) confidence D) lift Answer: D Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 15) ________ shows how much the base probability increases or decreases when other products are purchased. A) Lift B) Support C) Confidence D) Cohesion Answer: A Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
16) Which of the following techniques uses a hierarchical arrangement of criteria to make predictions? A) market-basket analysis B) RFM technique C) Cooke method D) decision tree Answer: D Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 17) What is the basic idea of the decision tree technique? A) to analyze and rank customers according to their purchasing patterns B) to select attributes that are most useful for classifying entities on some criterion C) to determine annual sales patterns D) to capture, store, analyze, and display geospatial data Answer: B Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases True or False 1) Database marketing is the application of business intelligence systems to the planning and execution of marketing programs. Answer: TRUE Page Ref: 518 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Data mining techniques are essential for database marketing. Answer: TRUE Page Ref: 518 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
6 Copyright © 2014 Pearson Education, Inc.
3) The RFM score is obtained by ranking the customers on the basis of pricing patterns. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 4) The RFM score of customers is obtained by multiplying their recency score, frequency score, and money score. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) A high F score denotes that the customer has bought an expensive item recently. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) A shop finds that the M score of a customer is 1. This means that the customer has paid high dollar value to the shop. Answer: TRUE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 7) RFM analysis does not provide an understanding of the dollar value spent by a customer. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
8) A customer obtains an RFM score of 555. This means that the customer is very important to the seller. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) The frequency of customer purchases is not a determining factor for RFM score. Answer: FALSE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) RFM can be a useful tool to determine who your best customers are and who hasn't been in to the store in a while. Answer: TRUE Page Ref: 519 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 11) RFM scores can be used to concentrate the efforts of salespeople. Answer: TRUE Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 12) Market-basket analysis is used to explore cross-selling opportunities. Answer: TRUE Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
13) A market-basket analysis shows that the support for products A and B is very high. This means that probability of buying B is very high if the customer has bought A. Answer: TRUE Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 14) In market-basket analysis terminology, confidence refers to the probability that two items will be bought together. Answer: FALSE Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 15) The ratio of confidence to the base probability of buying an item is called support. Answer: FALSE Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 16) Decision-tree analysis is a data mining technique that requires a high degree of supervision. Answer: FALSE Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 17) The decision tree makes decisions based on If/Then decision rules. Answer: TRUE Page Ref: 523 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
18) A common business application of decision trees is to classify loans by likelihood of default. Answer: TRUE Page Ref: 523 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases Essay 1) What is database marketing? Answer: Database marketing is the application of business intelligence systems to the planning and execution of marketing programs. Databases are a key component of database marketing, but data-mining techniques are also very important. Database marketing makes intelligent use of the data available with organizations to increase sales and customer value. Page Ref: 518 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
2) Describe the process of conducting RFM analysis. Answer: RFM analysis is a way of analyzing and ranking customers according to their purchasing patterns. It is a simple technique that considers how recently (R) a customer has ordered, how frequently (F) a customer orders, and how much money (M) the customer spends per order. To produce an RFM score, the program first sorts customer purchase records by the date of most recent (R) purchase. In a common form of this analysis, the program then divides the customers into five groups and gives customers in each group a score of 1 to 5. The 20 percent of the customers having the most recent orders are given an R score of 1, the 20 percent of the customers having the next most recent orders are given an R score of 2, and the last 20 percent are given an R score of 5. The program then re-sorts the customers on the basis of how frequently they order. The 20 percent of the customers who order most frequently are given an F score of 1, the next 20 percent of most frequently ordering customers are given a score of 2, and the least frequently ordering customers are given an F score of 5. Finally, the program sorts the customers again according to the amount spent on their orders. The 20 percent who have ordered the most expensive items are given an M score of 1, the next 20 percent are given an M score of 2, and the 20 percent who spend the least are given an M score of 5. A customer who has obtained an R score of 1, an F score of 3, and an M score of 3 is given an RFM score 133. Page Ref: 519 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) What is a market-basket analysis? Answer: Market-basket analysis is a data-mining technique for determining sales patterns in an attempt to find out the products that a consumer may purchase together. This gives companies an opportunity to cross-sell and increase overall dollar intake. Page Ref: 520 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
4) In market-basket terminology, what is lift? How is it related to confidence? Answer: In market-basket terminology, conditional probability estimate is called the confidence. The ratio of confidence to the base probability of buying an item is called lift. Lift shows how much the base probability increases or decreases when other products are purchased. Lift for two items is calculated by dividing the confidence of the two items by the base probability of one of the items. Lift is directly proportional to confidence. Page Ref: 521 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 5) What are decision trees? How do they classify people into groups? Answer: A decision tree is a hierarchical arrangement of criteria that predict a classification or a value. Decision tree analysis is an unsupervised data mining technique. The analyst sets up the computer program and provides the data to analyze, and the decision-tree program produces the tree. The basic idea of a decision tree is to select attributes that are most useful for classifying entities on some criterion. The user should input data about different attributes into the decision-tree program. The program then analyzes all of the attributes and selects an attribute that creates the most disparate groups. The more different the groups, the better the classification will be. A decision-tree program creates groups that are as pure as possible. A common business application of decision trees is to classify loans by likelihood of default. Page Ref: 521-523 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
12 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 13: Reporting Systems and OLAP Multiple Choice 1) Which of the following tools is used to create information from disparate data sources and to deliver that information to the proper user on a timely basis? A) authoritative system B) reporting system C) monitoring system D) intelligence system Answer: B Page Ref: 528 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) Which of the following reporting system functions will become useful if a user wants to select a portion of the database on the basis of a specific trait? A) sorting B) calculating C) grouping D) filtering Answer: D Page Ref: 528 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 3) Reporting systems use the ________ to prepare and deliver reports to the proper users on a timely basis. A) index B) directory C) metadata D) register Answer: C Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
1 Copyright © 2014 Pearson Education, Inc.
4) Reports that are not subject to change and are prepared from underlying data are referred to as ________. A) stable reports B) static reports C) underlying reports D) data reports Answer: B Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) Which of the following is a medium for reporting query reports? A) paper and PDF file B) digital dashboard C) Web site D) alerts via email Answer: C Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 6) XML Web service reports are an example of ________ reports. A) static B) dynamic C) OLAP D) query Answer: C Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
2 Copyright © 2014 Pearson Education, Inc.
7) Reports that are prepared in response to data entered by users are termed ________. A) query reports B) static reports C) dynamic reports D) OLAP reports Answer: A Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 8) Which of the following is an electronic report media that can be customized for particular users? A) hoarding B) mirror display C) digital dashboard D) billboard Answer: C Page Ref: 532 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 9) Users can declare that they wish to receive notification of events, say, via email or on their cell phones. These kinds of reports are termed as ________. A) datums B) RFM C) OLAP reports D) alerts Answer: D Page Ref: 532 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
3 Copyright © 2014 Pearson Education, Inc.
10) Pull report refers to ________. A) a report that takes hours for creation B) a report about the functioning of the system C) a report generated by user request D) a report prepared from the underlying data Answer: C Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 11) Which of the following types of reports is an example of a push report? A) static report B) dynamic report C) query report D) OLAP report Answer: A Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 12) Creating the report structure and formatting the report are a part of ________. A) report management B) report authoring C) report pitching D) report delivery Answer: B Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) The purpose of ________ is to define who receives what reports, when, and by what means. A) report management B) report authoring C) report finishing D) report pitching Answer: A Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 4 Copyright © 2014 Pearson Education, Inc.
14) Which of the following reports have the ability to sum, count, average, and perform other simple arithmetic operations on groups of data? A) query reports B) static reports C) database reports D) OLAP reports Answer: D Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) In the OLAP reports, the data item that is to be processed is called ________. A) measure B) dimension C) cube D) drill Answer: A Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 16) With reference to the online analytical processing, a presentation of a measure with associated dimensions is known as an ________. A) OLAP mode B) OLAP server C) OLAP tool D) OLAP cube Answer: D Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
5 Copyright © 2014 Pearson Education, Inc.
17) What are dimensional databases? A) databases storing detailed data about organizational operations B) databases that are structured to support OLAP processing C) databases consisting of data developed by individual end-users D) databases that are located online and cover millions of systems Answer: B Page Ref: 537 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases True or False 1) Reporting systems cannot generate reports that require calculations on the data. Answer: FALSE Page Ref: 528 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 2) Data generated from public sources is a component of reporting systems. Answer: TRUE Page Ref: 530 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) Metadata is used to describe reports, users, groups, roles, events, and other entities involved in the reporting activity. Answer: TRUE Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
6 Copyright © 2014 Pearson Education, Inc.
4) Reporting systems use dedicated indexing systems instead of metadata to prepare and deliver reports to the proper users on a timely basis. Answer: FALSE Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) A reporting system can create dynamic reports only if the most current data is available. Answer: TRUE Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 6) Query reports allow the user to dynamically change the report grouping structures. Answer: FALSE Page Ref: 532 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 7) A report on current stock prices is an example of a static report. Answer: FALSE Page Ref: 531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) Alerts generated on the basis of user notification are not treated as reports. Answer: FALSE Page Ref: 532 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
7 Copyright © 2014 Pearson Education, Inc.
9) Push reports are generated only on receiving a user request. Answer: FALSE Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 10) Connecting to data sources is a part of report management. Answer: FALSE Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 11) An administrator in a company defines who receives what reports, when, and by what means. These functions performed by the administrator are referred to as report delivery. Answer: FALSE Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 12) For query reports, the report-delivery system serves as an intermediary between the user and the report generator. Answer: TRUE Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 13) In OLAP reports, a dimension refers to an item that is to be processed in the OLAP report. Answer: FALSE Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
8 Copyright © 2014 Pearson Education, Inc.
14) Each OLAP cube in a report is a characteristic of the measures in the OLAP report. Answer: FALSE Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 15) Users are not allowed to alter the format of OLAP reports. Answer: FALSE Page Ref: 535 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 16) The process of dividing the data in OLAP reports into more detail is termed drill-down. Answer: TRUE Page Ref: 535 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 17) OLAP report generation is slower compared to standard DBMS report generation. Answer: TRUE Page Ref: 537 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases 18) Databases that are structured to support OLAP processing are called OLAP databases. Answer: FALSE Page Ref: 537 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
9 Copyright © 2014 Pearson Education, Inc.
Essay 1) What is a reporting system? What are the operations performed by them? Answer: A reporting system is an information system that creates information by processing data from disparate sources and delivering that information to the proper users on a timely basis. Reporting systems generate information from data as a result of four operations: (1) filtering data, (2) sorting data, (3) grouping data, and (4) making simple calculations on the data. Page Ref: 528 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for using and managing databases 2) How does a reporting system obtain the necessary data to generate reports? Answer: Data from disparate data sources are read and combined, using filtering, sorting, grouping, and simple calculating, to produce information. Some data are generated within the organization, other data are obtained from public sources, and still other data may be purchased from data utilities. Page Ref: 530-531 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 3) What are the different types of report? Explain. Answer: The different types of report are static, dynamic, query, and online analytical processing (OLAP). Static reports are prepared once from the underlying data, and they do not change. A report of past year's sales, for example, is a static report. Other reports are dynamic; at the time of creation, the reporting system reads the most current data and generates the report using that fresh data. A report on sales today and a report on current stock prices are both dynamic reports. Query reports are prepared in response to data entered by users. Searching for data in Google is an example of a query report. Online analytical processing (OLAP) is a fourth type of report. OLAP reports allow the user to dynamically change the report grouping structures. Page Ref: 531-532 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases
10 Copyright © 2014 Pearson Education, Inc.
4) What is the difference between push and pull reports? Answer: Organizations send a push report to users according to a preset schedule. Users receive the report without any activity on their part. In contrast, users must request a pull report. To obtain a pull report, a user goes to a Web portal or digital dashboard and clicks a link or button to cause the reporting system to produce and deliver the report. Page Ref: 533 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for using and managing databases 5) Explain report authoring, management, and delivery. Answer: Authoring a report involves connecting to data sources, creating the report structure, and formatting the report. Organizations can author reports by using a developer tool like Microsoft's Visual Studio. The purpose of report management is to define who receives what reports, when, and by what means. Most report management systems allow the report administrator to define user accounts and user groups and to assign particular users to particular groups. The report-delivery function of a reporting system pushes reports or allows them to be pulled according to report-management metadata. Reports can be delivered via an email server, via a Web site, via SOA services, or by other program-specific means. Page Ref: 533-534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for using and managing databases 6) Describe online analytical processing. Answer: Online analytical processing (OLAP) provides the ability to sum, count, average, and perform other simple arithmetic operations on groups of data. The remarkable characteristic of OLAP reports is that their format is dynamic. The viewer of the report can change the report's structure. An OLAP report has measures and dimensions. A measure is the data item of interest. It is the item that is to be summed or averaged or otherwise processed in the OLAP report. A dimension is a characteristic of a measure. Page Ref: 534 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
11 Copyright © 2014 Pearson Education, Inc.
7) What is an OLAP cube? Answer: A presentation of a measure with associated dimensions is often called an OLAP cube, or sometimes simply a cube. The reason for this term is that some products show these displays using three axes, like a cube in geometry. An OLAP cube and an OLAP report are the same thing. Page Ref: 534-535 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for using and managing databases
12 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 14: Geographic Information Systems Multiple Choice 1) A geographic information system (GIS) is an information system that captures, stores, analyzes, and displays ________ data. A) geospatial B) geosynchronous C) geological D) geometric Answer: A Page Ref: 540 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 2) ________ data is data that can be ordered in reference to the earth. A) Geological B) Geometric C) Geosynchronous D) Geospatial Answer: D Page Ref: 540 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) Andrew used Google Maps to find directions to Taco Terrain, a restaurant known for serving the best tacos in the city. Which of the following types of users for GIS applications best describes Andrew? A) operations personnel B) casual users C) business intelligence users D) field personnel Answer: B Page Ref: 544 Difficulty: Hard AACSB: Reflective Thinking Skills Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems
1 Copyright © 2014 Pearson Education, Inc.
4) ________ employ GIS to help solve a problem. A) Developers B) Field personnel C) Business intelligence users D) Operations personnel Answer: C Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) ________ create GIS systems in response to requirements. A) Developers B) Field personnel C) Business intelligence users D) Operations personnel Answer: A Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) ________ run the GIS system, and maintain the currency of database data. A) Field personnel B) Business intelligence users C) Developers D) Operations personnel Answer: D Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
2 Copyright © 2014 Pearson Education, Inc.
7) ________ are involved in the capturing of geospatial data. A) Field personnel B) Business intelligence users C) Developers D) Operations personnel Answer: A Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) Which of the following does a raster map consist of? A) points B) pixels C) lines D) shapes Answer: B Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) Which of the following is true of raster maps? A) They consist of points, lines, and shapes. B) They become blurry when enlarged. C) They do not distort straight lines. D) They are difficult to create from pictures and scanners. Answer: B Page Ref: 544-545 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following is true of vector maps? A) They are easy to create. B) Once created, they scale perfectly. C) Their construction does not require any human involvement. D) They consist of pixels, each of which has some value. Answer: B Page Ref: 545 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) A ________ is a set of elevations based on particular values of the earth's radii. A) geocode B) zone C) geofence D) datum Answer: D Page Ref: 546 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) Which of the following best defines a map projection? A) It is the process used for converting all the location identifiers to a common scheme. B) It is a technique that involves dividing the earth into 60 north-south segments. C) It is a geographic boundary set up within a GIS. D) It is a technique for placing locations on the surface of the earth onto a flat surface. Answer: D Page Ref: 547 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
4 Copyright © 2014 Pearson Education, Inc.
13) To construct a map, the GIS application needs to convert all the location identifiers to a common scheme. This process is called ________. A) geocoding B) zonal marking C) geofencing D) project mapping Answer: A Page Ref: 548 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) The Military Grid Reference System (MGRS) divides the earth into 60 north-south segments called ________. A) territories B) dominions C) zones D) sections Answer: C Page Ref: 548 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) A ________ is a geographic boundary set up within a GIS. A) dominion B) geofence C) zone D) geocode Answer: B Page Ref: 551 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
5 Copyright © 2014 Pearson Education, Inc.
16) ________ maps display colors, shades, or patterns in accordance with category values of underlying data. A) Choropleth B) Raster C) Dasymetric D) Vector Answer: A Page Ref: 554 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) A modifiable areal unit problem occurs when ________. A) a map displays colors, shades, or patterns in accordance with category values of underlying data B) an organization uses GIS to achieve its goals and objectives or to obtain a competitive advantage C) point-based spatial data are aggregated into regions and the results depend on how the regions are defined D) GIS sites have multiple users whose analyses can be invalidated by incorrect or unexpected data imports Answer: C Page Ref: 556 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects True or False 1) Geospatial data is data that can be ordered in reference to the earth. Answer: TRUE Page Ref: 540 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
6 Copyright © 2014 Pearson Education, Inc.
2) GIS create information by manipulating and displaying data in a geospatial context. Answer: TRUE Page Ref: 540 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 3) Application-specific programs are different from application programs for database systems. Answer: FALSE Page Ref: 541 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 4) GIS consist of a blend of external geospatial and relational database data. Answer: TRUE Page Ref: 542 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 5) A business that wants to view a map of a customer's location is a business intelligence user. Answer: FALSE Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) Developers create GIS systems in response to requirements. Answer: TRUE Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
7 Copyright © 2014 Pearson Education, Inc.
7) Operations personnel are involved in the capture of geospatial data. Answer: FALSE Page Ref: 544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) A raster map consists of points, lines, and shapes. Answer: FALSE Page Ref: 544-545 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) Raster maps overcome the deficiencies of vector maps, but are difficult to create. Answer: FALSE Page Ref: 545 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) Once created, vector maps scale perfectly. Answer: TRUE Page Ref: 545 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) Vector maps lose their fidelity when their size is doubled or halved. Answer: FALSE Page Ref: 545 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
12) The best geometric model for the surface of the earth is an ellipsoid. Answer: TRUE Page Ref: 546 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 13) A geocode is a set of elevations based on particular values of the earth's radii. Answer: FALSE Page Ref: 546 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) A map projection is a technique for placing locations on the surface of the earth onto a flat surface. Answer: TRUE Page Ref: 547 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) To construct a map, the GIS application needs to convert all location identifiers to a common scheme by a process called geofencing. Answer: FALSE Page Ref: 548 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 16) The Military Grid Reference System divides the earth into 60 north-south segments called zones. Answer: TRUE Page Ref: 548 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9 Copyright © 2014 Pearson Education, Inc.
17) One application for a geofence is to notify personnel when trucks or other containers are nearing their destination. Answer: TRUE Page Ref: 551 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 18) A dasymetric map displays colors, shades, or patterns in accordance with category values of underlying data. Answer: FALSE Page Ref: 554 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 19) The modifiable areal unit problem is a condition that occurs when point-based spatial data are aggregated into regions and the results depend on how the regions are defined. Answer: TRUE Page Ref: 556 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects Essay 1) Explain the procedures component of a GIS. Answer: For sites like Google Maps/Earth and Bing Maps, the user interface is designed to be intuitive and easy to use. For more complicated sites with more domain-specific capabilities, procedures are needed to help users obtain and process the data they need. Procedures are also needed for importing and exporting bulk data. This task can be complex and is important, especially for GIS sites that have multiple users whose analyses can be invalidated by incorrect or unexpected data imports. Hundreds of maps are produced for various purposes and studies, and these maps are often shared among a group. Consequently, procedures for managing large map libraries are important. Page Ref: 543-544 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Compare and contrast different business intelligence systems 10 Copyright © 2014 Pearson Education, Inc.
2) Explain in brief how GIS maps are constructed. Answer: A GIS map typically consists of layers of individual maps that are placed over one another. One layer might, for example, portray the terrain such as mountains and valleys and slopes. Another layer might portray vegetation, another layer portray streets and highways, another layer buildings, and so forth. Each layer is placed on top of the others. The map that is shown to the user is a composite of several maps. The GIS display manager can add, remove, or reorder layers according to the users' needs. Page Ref: 544-545 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) Differentiate between raster and vector maps. Answer: A raster map consists of pixels, each of which has some value; often that value is a color, but it could also be a data value, such as elevation or temperature. A vector map consists of points, lines, and shapes. Here, each shape is an ordered list of points and, because these shapes are closed, the first and last points are the same. Raster maps are easy to create from pictures and scanners and, at the scale in which they were created, they show details well. Because raster maps are made of pixels, straight lines can appear irregular. Vector maps overcome the deficiencies of raster maps, but are difficult to create. Once created, however, vector maps scale perfectly. Page Ref: 545 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Compare and contrast different business intelligence systems 4) What is a map projection? Answer: A map projection is a technique for placing locations on the surface of the earth onto a flat surface. Over the centuries, cartographers have devised numerous map projections that result in different types of distortion. Some of these projections are accurate in the way they portray area; they are said to preserve area. Others, which are used for local navigation, preserve angles between map features. Other projections show the shortest distance between two points on the surface of the earth as a straight line on the map. And some projections are compromises of all of these. Page Ref: 547 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
11 Copyright © 2014 Pearson Education, Inc.
5) How does the Military Grid Reference System (MGRS) work? Answer: The Military Grid Reference System (MGRS) was developed by the U.S. military in 1947 and is used in GIS applications, worldwide. It was created before GPS, when longitudes were difficult to determine and always suspect. It divides the earth into 60 north-south segments called zones. Zones are divided into squares that are 6 degrees east/west and 8 degrees north/south. Each square has a two-letter identifier. Within a square, distances are measured in meters from the east boundary and from the north boundary. Page Ref: 548 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) What is asset tracking? Answer: Asset tracking is another organizational use of GIS. One common example is to track the movement of goods in the supply chain using a GPS device and a GIS. An onboard GPS and transmitter reports the location of the asset, say a pallet of goods, a truck, a container, or even a single item within a container. The reported locations are input to a GIS, and the locations of all such assets can be plotted on a GIS display. Page Ref: 551 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
12 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 15: Systems Development Project Management Multiple Choice 1) Systems development projects require the balancing of three critical drivers: requirements, cost, and ________. A) scope B) time C) performance D) value Answer: B Page Ref: 561 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) A plan, known as the ________, of a project stipulates the tasks to be accomplished, the labor and other resources assigned to those tasks, and the schedule for completion. A) baseline B) data model C) bottom line D) database designs Answer: A Page Ref: 562 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) Which of the following is a technique that stipulates phases and processes for constructing information systems, but does not address the management of large-scale projects? A) SDLC B) PMP C) PMI D) ANSI Answer: A Page Ref: 562 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 1 Copyright © 2014 Pearson Education, Inc.
4) In the PMBOK® Guide, ________ refer to different stages in the life of a project. A) configuration controls B) knowledge areas C) process groups D) resource zones Answer: C Page Ref: 563 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) ________ is the knowledge area that refers to the management of the overall project and the construction of the final product. A) Project integration B) Communications management C) Procurement management D) Quality management Answer: A Page Ref: 563 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) ________ is a knowledge area that concerns the methods, media, and schedules for exchanging information with the project's sponsors, within the team itself, and with others having an interest in the progress of the project. A) Procurement management B) Communications management C) Quality management D) Project integration Answer: B Page Ref: 564 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
2 Copyright © 2014 Pearson Education, Inc.
7) ________ is a knowledge area that concerns contracts with outside vendors for services, materials, and outsourcing of functions. A) Communications management B) Quality management C) Project integration D) Procurement management Answer: D Page Ref: 564 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) Each task in a systems development project should culminate in one or more ________. A) deliverables B) zones C) segments D) designs Answer: A Page Ref: 564 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) The ________ is the sequence of activities that determine the earliest date by which the project can be completed. A) Gantt chart B) critical path C) baseline D) scope Answer: B Page Ref: 565 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
3 Copyright © 2014 Pearson Education, Inc.
10) A ________ is a hierarchy of the tasks required to complete a project. A) baseline B) work-breakdown structure C) reliable analysis D) V-Model Answer: B Page Ref: 564 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) With respect to WBS, ________ means to define the system boundaries. A) Gantt chart B) critical path C) scope D) baseline Answer: C Page Ref: 564 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) The biggest challenge in planning systems development is ________. A) creating B) scheduling C) analyzing D) testing Answer: B Page Ref: 567 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
4 Copyright © 2014 Pearson Education, Inc.
13) The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources. A) perceptual mapping B) coordination control C) critical path analysis D) configuration control Answer: D Page Ref: 569 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) ________ is the process by which users agree to one set of conditions, then add a bit more, then add a bit more, and so forth. A) Requirements creep B) Diseconomies of scale C) Configuration control D) Coordination Answer: A Page Ref: 570 Difficulty: Easy Study Question: Study Question 7 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects True or False 1) The development of large-scale systems can involve integrating products and services from different companies. Answer: TRUE Page Ref: 560 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) Large-scale systems development projects require the balancing of three critical drivers: requirements, cost, and time. Answer: TRUE Page Ref: 561 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
5 Copyright © 2014 Pearson Education, Inc.
3) The trade-off between time and cost is a simple process; the time involved in a project can always be reduced by increasing cost. Answer: FALSE Page Ref: 561 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 4) Larger projects with longer development intervals will find it easier to keep to the baseline or plan. Answer: FALSE Page Ref: 562 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) The PMBOK® Guide does not describe the details of each practice or technique but instead, identifies those practices that are known to be effective for different situations and briefly describes their use. Answer: TRUE Page Ref: 563 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) The purpose of risk management is to ensure that managers understand project risks and balance risk factors. Answer: TRUE Page Ref: 564 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 7) Documents, designs, prototypes, data models, database designs, working data entry screens, and the like are examples of deliverables in a systems development project. Answer: TRUE Page Ref: 564 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
6 Copyright © 2014 Pearson Education, Inc.
8) The critical path is a hierarchy of the tasks required to complete a project. Answer: FALSE Page Ref: 564 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) Regarding task dependencies, all tasks must begin and end at the same time. Answer: FALSE Page Ref: 564 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) The baseline WBS can be used for monitoring the project. Answer: TRUE Page Ref: 566 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) The biggest challenge in planning systems development is scheduling. Answer: TRUE Page Ref: 567 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) Avoiding the major schedule risks and never developing software in-house is one of the approaches businesses take to address the challenges of scheduling for large-scale systems. Answer: TRUE Page Ref: 567 Difficulty: Moderate AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
7 Copyright © 2014 Pearson Education, Inc.
13) Function points can be used to determine the number of lines of code, which can then be used to estimate project schedules. Answer: TRUE Page Ref: 568 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 14) A well-managed project will never face problems of diseconomies of scale. Answer: FALSE Page Ref: 568 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) A loss of control over a project's configuration is easily fixed through remedial measures. Answer: FALSE Page Ref: 569 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 16) The term "configuration control" refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources. Answer: TRUE Page Ref: 569 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) Taking responsibility for requirements is the single most important task a user can perform for a large-scale development project. Answer: TRUE Page Ref: 569 Difficulty: Easy Study Question: Study Question 7 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
18) Requirements creep is the process by which a project manager reduces his/her responsibilities for requirements through miniscule rollbacks. Answer: FALSE Page Ref: 570 Difficulty: Easy Study Question: Study Question 7 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 19) Users must take responsibility for managing requirements changes and for avoiding requirements creep. Answer: TRUE Page Ref: 570 Difficulty: Easy Study Question: Study Question 7 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects Essay 1) What are the characteristics of large-scale systems development projects? Answer: A large-scale systems development project has many features and functions. It has large, complex computer programs and databases with hundreds of tables, dozens to hundreds of relationships, and terabytes of data. Such large development projects affect many business processes and support hundreds or thousands of concurrent users. They require a large development team of 50 to 100 or more systems analysts, programmers, PQA engineers, and managers. Large-scale systems are often simultaneously developed at multiple sites, often dispersed across different countries. Additionally, the development of large-scale systems can involve integrating products and services from different companies. Large-scale systems are frequently localized for different languages. Finally, large-scale systems development requires extended development intervals, sometimes as long as 5 or 6 years. Page Ref: 560-561 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
9 Copyright © 2014 Pearson Education, Inc.
2) What is the PMBOK ® Guide for project management? List the components of the grid in PMBOK ® Guide 2004. Answer: Project Management Body of Knowledge (PMBOK) ® Guide, compiled by the PMI, contains what many believe are the best project management processes, practices, and techniques. The document does not describe the details of each practice or technique but instead identifies those practices that are known to be effective for different situations and briefly describes their use. Versions of this document are denoted by the year in which they are published. As of 2010, the current version is A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition. PMBOK® Guide is organized according to a grid, which shows five process groups and nine knowledge areas. The process groups refer to different stages in the life of a project. The nine knowledge areas refer to factors to be managed throughout the life of the project. Page Ref: 563-564 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) What is a critical path? How is a critical path analysis done? Answer: The critical path is the sequence of activities that determine the earliest date by which the project can be completed. The earliest date is the date determined by considering the longest path through the network of activities. Paying attention to task dependencies, the planner will compress the tasks as much as possible. Those tasks that cannot be further compressed lie on the critical path. Microsoft Project and other project-planning applications can readily identify critical path tasks. Managers can use the critical path to perform critical path analysis. If a task is on the critical path, and if that task runs late, the project will be late. Hence, tasks on the critical path cannot be allowed to run late if the project is to be delivered on time. Additionally, tasks not on the critical path can run late to the point at which they would become part of the critical path. Hence, up to a point, resources can be taken from noncritical path tasks to shorten tasks on the critical path. Using critical path analysis, managers can move resources among tasks so as to compress the schedule. Page Ref: 565-567 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
10 Copyright © 2014 Pearson Education, Inc.
4) The biggest challenge in planning large-scale systems development is scheduling. Describe the three approaches organizations take to address this challenge. Answer: The first approach that an organization can take to address the challenge of scheduling large-scale systems development projects is to avoid the major schedule risks and never develop software in-house. Instead, they license software from vendors. However, if no suitable software exists, companies can take one of two remaining approaches. They can admit the impossibility of systems development scheduling and plan accordingly. They abandon the SDLC and decide to invest a certain level of resources into a project, manage it as best they can, and take the schedule that results. Only loose commitments are made regarding the completion date and final system functionality. The third approach is to attempt to schedule the development project in spite of all the difficulties. Several different estimation techniques can be used. If the project is similar to a past project, the schedule data from that past project can be used for planning. When such similar past projects exist, this technique can produce quality schedule estimates. If there is no such past project, managers can estimate the number of lines of code that will need to be written. Then they can use industry or company averages to estimate the time required. Another technique is to estimate the function points in a program, use each function point to determine the number of lines of code, and use that number to estimate schedules. A function point is simply a feature or function of the new program. Page Ref: 567-568 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
11 Copyright © 2014 Pearson Education, Inc.
5) What are the biggest challenges for managing a large-scale systems development project? Answer: The challenges of managing large-scale systems development projects arise from four different factors: coordination, diseconomies of scale, configuration control, and unexpected events. Large-scale projects are usually organized into a variety of development groups that work independently. Coordinating the work can be difficult, particularly if the groups reside in different geographic locations or different countries. An accurate and complete WBS facilitates coordination, but no project ever proceeds exactly in accordance with the WBS. The coordination problem is increased because software is pure thought-stuff. Another problem is diseconomies of scale. Adding more people to a project increases coordination requirements. The number of possible interactions among team members rises exponentially with the number of team members. Ultimately, no matter how well managed a project is, diseconomies of scale will set in. Also, as the project proceeds, controlling the configuration of the work product becomes difficult. Problems can occur with designs, program code, database data, and other system components. The term "configuration control" refers to a set of management policies, practices, and tools that developers use to maintain control over the project's resources. Such resources include documents, schedules, designs, program code, test suites, and any other shared resource needed to complete the project. Configuration control is vital. The last major challenge to large-scale project management is unexpected events. The larger and longer the project, the greater the chance of disruption due to an unanticipated event. Page Ref: 568-569 Difficulty: Easy Study Question: Study Question 6 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
12 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 16: Agile Development Multiple Choice 1) According to the SDLC, the progress from requirements to design to implementation is called the ________ method. A) life cycle B) waterfall C) water cycle D) scrum Answer: B Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 2) The SDLC gained popularity when the U.S. Department of ________ stipulated that it would be used for all software development contracts. A) Defense B) Education C) Agriculture D) Commerce Answer: A Page Ref: 573 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) The SDLC generates value ________. A) in the beginning B) all along C) frequently D) at the very end Answer: D Page Ref: 574 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
1 Copyright © 2014 Pearson Education, Inc.
4) Designing only those portions of the design that are needed to complete the current work being done is known as ________ design. A) waterfall B) scrum C) just-in-time D) frequent Answer: C Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 5) Scrum is a ________ term. A) rugby B) polo C) tennis D) cricket Answer: A Page Ref: 575 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 6) According to the principles of scrum essentials, a team consists of ________ members. A) 2-6 B) 3-7 C) 4-8 D) 5-9 Answer: D Page Ref: 575 Difficulty: Moderate AACSB: Reflective Thinking Skills Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
2 Copyright © 2014 Pearson Education, Inc.
7) According to scrum essentials, the first step of each work period is to ________. A) conduct team meets B) determine tasks to perform C) select requirements to consider D) deliver working version Answer: C Page Ref: 575 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) In ________ programming two members share the same computer and write a computer program together. A) coupled B) paired C) double D) split Answer: B Page Ref: 576 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 9) As teams work together, they will learn the total number of points of work they can accomplish each scrum period. That term is called the team's ________. A) velocity B) speed C) momentum D) vector Answer: A Page Ref: 579 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
3 Copyright © 2014 Pearson Education, Inc.
True or False 1) The nature of the SDLC denies the fact that system requirements are fuzzy and always changing. Answer: TRUE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 2) According to the SDLC, the progress from requirements to implementation is non-linear. Answer: FALSE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) The SDLC gained popularity when the U.S. Department of Commerce stipulated that it would be used for all software development contracts. Answer: FALSE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 4) In a model where requirements change periodically, the waterfall method works well. Answer: FALSE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 5) The waterfall model used by the SDLC is well-suited for building physical things. Answer: TRUE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
4 Copyright © 2014 Pearson Education, Inc.
6) The SDLC is falling out of favor because it is very risky. Answer: TRUE Page Ref: 573 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 7) "Test as you go" is a principle of the SDLC. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) "Extreme programming" is an alternative to the SDLC. Answer: TRUE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 9) Agile development methodologies welcome change. Answer: TRUE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 10) The SDLC processes are designed to frequently deliver a working version of the product. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
5 Copyright © 2014 Pearson Education, Inc.
11) Unlike agile technologies, the SDLC delivers benefits early and often. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 12) Agile development methodologies advocate the design of the complete system at the beginning. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 13) Agile development methodologies discourage interaction between developers and customers. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 14) According to agile development methodologies, testing never involves the business customer. Answer: FALSE Page Ref: 574 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 15) Agile development methodologies are generic. Answer: TRUE Page Ref: 575 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
6 Copyright © 2014 Pearson Education, Inc.
16) Scrum essentials encourage minimal documentation. Answer: TRUE Page Ref: 575 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 17) In paired programming, two computers are used by the same programmer. Answer: FALSE Page Ref: 576 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 18) Scrum is distinguished from other agile development methodologies, in part, by the way that it uses requirements to drive planning and scheduling. Answer: TRUE Page Ref: 577 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure Essay 1) Why is the SDLC losing credibility? Answer: The systems development life cycle (SDLC) process is falling out of favor in the systems development community, primarily for two reasons. First, the nature of the SDLC denies what every experienced developer knows is true: systems requirements are fuzzy and always changing. They change because they need to be corrected, or more is known, or users, once they see a part of the application, change their minds. Other reasons are that business needs change, or technology offers other possibilities. According to the SDLC, however, progress goes in a linear sequence from requirements to design to implementation. Sometimes this is called the waterfall method because the assumption is that once you've finished a phase, you never go back. Requirements are done. Then you do design. Design is done; then you implement. However, experience has shown that it just doesn't work that way. Page Ref: 573 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
7 Copyright © 2014 Pearson Education, Inc.
2) What are the principles of agile development methodologies? Answer: The principles of agile development are: • Expect, even welcome, changes in requirements. • Frequently deliver a working version of the product. • Work closely with customer, for the duration. • Design as you go. • Test as you go. • Team knows best how it's doing/how to change. • Can be used for applications, information systems, and business process development. Page Ref: 574-575 Difficulty: Moderate Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) Briefly outline the scrum essentials. Answer: • Requirements list drives process • Each work period (1 to 4−8 weeks): – Select requirements to consider – Determine tasks to perform – Select requirements to deliver – Team meets daily for 15 min (stand-up) • What I did yesterday • What I'm going to do today • What's blocking me – Test frequently – Paired work possible – Minimal documentation – Deliver (something) that works! – Evaluate team's work process at end of period (and say thanks) • Rinse and repeat until – Customer says we're done – Out of time – Out of money • Three principal roles – Product Owner (business professional) – Scrum Master – Team Members (5-9 people) Page Ref: 575 Difficulty: Moderate Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
8 Copyright © 2014 Pearson Education, Inc.
4) According to the scrum essentials, when is a project said to be done? Answer: Work continues in a repeating cycle of scrum periods until one of three conditions is met: • The customer is satisfied with the product created and decides to accept the work product, even if some requirements are left unsatisfied. • The project runs out of time. • The project runs out of money. Page Ref: 576-577 Difficulty: Moderate Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 5) In a scrum, who is a product owner? Answer: The product owner is the business professional who provides the requirements and is available for clarification and testing. The product owner is the only person on a scrum team who has the authority to add, delete, or change requirements and their priority. Page Ref: 577 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 6) In a scrum, who is a scrum master? What are his/her responsibilities? Answer: A scrum master is an expert in scrum processes who helps to keep the process organized and operating. The scrum master is not the boss; he or she is more like a coach or even a referee. The scrum master steps in when meetings go too long, when team members are misusing meeting time, when the product sponsor isn't doing his or her job, and when other situations are not working. The scrum master is also the guardian of team members' time. If distractions occur, the scrum master steps in to eliminate them. If someone other than the product sponsor attempts to change requirements or priorities, the scrum master negates that attempt. Page Ref: 577 Difficulty: Moderate Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
9 Copyright © 2014 Pearson Education, Inc.
7) Who are considered scrum members? Answer: Team members are the programmers, systems analysts, business analysts, database designers, cloud-engineers, PQA testing personnel, and any other staff needed to build the work product. Scrum teams are small; five to nine team members are recommended. If work requires more personnel, then the work is reorganized to be accomplished by multiple scrum teams working in parallel. It's not clear that scrum works well for exceedingly large projects, but then again, it's not clear that any other development process works well for them, either. Page Ref: 577 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
10 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 17: Business Process Management Multiple Choice 1) A(n) ________ is a collection of data. A) ledger B) repository C) account D) data flow Answer: B Page Ref: 582 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) Which of the following is the first step in processing an order? A) checking customer credit B) approving special terms C) verifying availability D) preparing quotation Answer: D Page Ref: 583 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) Why is a customer's credit checked before checking availability of goods? A) for the smooth working of the process B) for arranging the special terms C) to prevent the wastage of shipping-verification labor D) to align the processes with organizational goals Answer: C Page Ref: 583 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
1 Copyright © 2014 Pearson Education, Inc.
4) A company stops stocking an item but procures it directly from the manufacturer. This implies that the company has made a change in its ________. A) product line B) supply chain C) credit policy D) distribution structure Answer: B Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) In which of the following cases will a business continually be in crisis, dealing with one process emergency after another? A) when the organization plans to develop the business process B) when an organization actively seeks to change business processes C) when the organization lets the need for change just happen to them D) when the organization plans to update its business process Answer: C Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) Which of the following steps is the most appropriate, if a company decides to accept more risk and sell to companies with lower credit scores? A) modifying the credit checking process B) implementing different ways of checking credit C) approval of the special terms before checking the credit D) shipping the inventory directly from the manufacturer, to lower the credit Answer: C Page Ref: 584 Difficulty: Easy AACSB: Analytic Skills Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
2 Copyright © 2014 Pearson Education, Inc.
7) In which of the following situations may credit checking be the first step in the procedure of processing an order? A) during recession B) during a merger C) during an acquisition D) during an amalgamation Answer: A Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) Which of the following is the first step in the business process management (BPM) cycle? A) creating system components B) creating models of business processes C) implementing the needed business processes D) assessing business process effectiveness Answer: B Page Ref: 584 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) In which of the following types of BPM scopes does problem resolution occur via committee and policy? A) informal B) departmental C) interenterprise D) enterprise Answer: D Page Ref: 585 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
3 Copyright © 2014 Pearson Education, Inc.
10) Which of the following is an example of a departmental scope? A) bills receivable B) enterprise resource management C) accounts payable D) customer relationship management Answer: C Page Ref: 585 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects True or False 1) A business process is a network of activities, roles, actors, repositories, and data sequence flows that interact to accomplish a business function. Answer: TRUE Page Ref: 582 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) If the customer's request for special terms is disapproved the cost of checking availability and credit is wasted. Answer: TRUE Page Ref: 583 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3) A substantial change in the business environment like the onset of a recession might mean that checking credit becomes unnecessary. Answer: FALSE Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
4 Copyright © 2014 Pearson Education, Inc.
4) Organizations can plan to develop and modify business processes, in which case the business will continually be in crisis, dealing with one process emergency after another. Answer: FALSE Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 5) The credit-check process is independent of the inclusion or exclusion of new categories of customers. Answer: FALSE Page Ref: 584 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 6) The salespeople are the closest to the customer and will be the first to learn the importance of delivery times. Answer: TRUE Page Ref: 583 Difficulty: Easy Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 7) Business processes and information systems are the same thing. Answer: FALSE Page Ref: 586 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 8) Business processes and information systems overlap. Answer: TRUE Page Ref: 586 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
5 Copyright © 2014 Pearson Education, Inc.
9) A procedure is a component of an information system and is embedded within a process activity. Answer: TRUE Page Ref: 587 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) A business process cannot use just one information system. Answer: TRUE Page Ref: 587 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) The relationship between business processes is one-to-many. Answer: FALSE Page Ref: 587 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) The information system that processes the Customer Database will be used by other business processes. Answer: TRUE Page Ref: 587 Difficulty: Easy Study Question: Study Question 3 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 13) Business processes consist of activities that do not involve information systems. Answer: TRUE Page Ref: 587 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
6 Copyright © 2014 Pearson Education, Inc.
14) Creating computer programs and designing databases in-house is more affordable than buying off-the-shelf software. Answer: FALSE Page Ref: 589 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) Both information systems and business processes can be purchased off-the-shelf. Answer: FALSE Page Ref: 590 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 16) It is impossible to buy an off-the-shelf computer application. Answer: FALSE Page Ref: 590 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 17) The difficulty of creating the as-is process diagram depends on the sophistication of the organization. Answer: TRUE Page Ref: 591 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 18) If employees are already using an IS, another way of adjusting role resources is to improve the information system so as to facilitate the new process. Answer: TRUE Page Ref: 592 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
7 Copyright © 2014 Pearson Education, Inc.
19) The resolution of implementation problems can be difficult for enterprise and inter-enterprise processes because there is no recognized authority to enforce solutions. Answer: TRUE Page Ref: 593 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects Essay 1) Give an example to illustrate how business processes fail to work when misaligned with the organization's goals. Answer: Business processes do not work well when they are misaligned with the organization's goals, objectives, or competitive strategy. For example, if the vendor has chosen a low-cost strategy, then taking the time to verify shipping dates might be at odds with that competitive strategy. The labor to verify shipping dates will raise sales costs and may prohibit the vendor from providing the lowest possible prices to its customers. Page Ref: 582 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 2) How can a change in customers, product lines, and supply chains affect business processes? Answer: A new category of customers could mean that the credit-check process needs to be modified; a certain category of customers is too risky to be extended credit. All sales to customers in this category must be cash. Or, a change in product lines might require different ways of checking availability. A change in the supply chain might mean that the company no longer stocks some items in inventory, but ships directly from the manufacturer instead. Page Ref: 584 Difficulty: Easy Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
8 Copyright © 2014 Pearson Education, Inc.
3) Describe business process management (BPM) in brief. Answer: Business process management (BPM) is a cyclical (recurring) process for systematically creating, assessing, and altering business processes. This cycle begins by creating models of business processes. The business users who have expertise and are involved in the particular process adjust and evaluate those models. Teams build an as-is model that documents the current situation and then changes that model to make adjustments necessary to solve process problems. The next step is to create system components. Next, needed business processes or changes to existing business processes are implemented. Well-managed organizations don't stop there. Instead, they create policies, procedures, and committees to continually assess business process effectiveness. When a need for change arises, the company models a new, adjusted business process, and the cycle is repeated. Page Ref: 584-585 Difficulty: Moderate Study Question: Study Question 1 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
9 Copyright © 2014 Pearson Education, Inc.
Experiencing MIS, 4e (Kroenke) Chapter Extension 18: International MIS Multiple Choice 1) Which of the following is true regarding the international business scenario in the twentieth century? A) After the dot-com bust, optical fiber was extremely scarce and expensive. B) After the fall of the Soviet Union, the economies of Russia and western Europe closed their markets to the world. C) Around the time of the advent of the Internet, the economies of North America and Europe became less integrated. D) Around the time of the advent of the Internet, the Chinese economy became more open to the world. Answer: D Page Ref: 596 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world 2) How has the global economy changed the competitive environment? A) Suppliers are not required to reach a wide range of customers. B) Customers now have less access to information about substitutes. C) It has intensified rivalry by increasing product and vendor choices. D) It has made it easier for new market entrants in all fields to penetrate the market. Answer: C Page Ref: 597 Difficulty: Moderate AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world 3) Today's global economy changes competitive strategies because ________. A) it enables unprecedented product differentiation B) the communication between a company and its customer has become one-sided C) it reduces the risk that a company has to bear D) it eliminates the need for localizing products Answer: A Page Ref: 597 Difficulty: Moderate AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world
1 Copyright © 2014 Pearson Education, Inc.
4) How does the global economy change value chains and business processes? A) World time differences enable global virtual companies to operate 24/7. B) Overseas outsourcing is no longer an attractive option. C) It makes it difficult for an international company to conduct sales and marketing efforts locally. D) It makes it mandatory for the manufacturing activities to be carried out from the home country. Answer: A Page Ref: 598 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world 5) Which of the following components of an information system is least impacted by internationalization? A) computer hardware B) software applications C) data D) procedures Answer: A Page Ref: 598 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Describe the effects of e-commerce on the modern business world 6) The process of making a computer program work in a second language is called ________. A) differentiating B) stringing C) localizing D) optimizing Answer: C Page Ref: 599 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
2 Copyright © 2014 Pearson Education, Inc.
7) Which of the following is true about the issues to be addressed when localizing a computer program? A) When translating the user interface for a program, the entire user interface, except the icons, will need to be changed. B) Programming techniques can be used to simplify and reduce the cost of localization. C) Forms and reports should be localized in a manner that does not necessitate redesigning the entire document. D) The help text should always be maintained in English. Answer: B Page Ref: 599 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8) Which of the following is true regarding localizing? A) Translating documents is less expensive, but more time consuming, than localizing computer programs. B) Localizing computer programs primarily involves translating documents from one language to another. C) Localization of computer programs should be planned from the very beginning. D) Localizing computer programs is easier than translating documents. Answer: C Page Ref: 599 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) Which of the following is an issue related to global databases? A) Often, data transmission speeds are too slow to process data from a single geographic location. B) A single database increases data integrity problems. C) International companies that have a single database must declare multiple languages for the company. D) With a single database, it is not possible to have an integrated view of the customer or the organization's operations. Answer: A Page Ref: 600 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 3 Copyright © 2014 Pearson Education, Inc.
10) ________ database processing refers to the processing of a single database that resides in multiple locations. A) Clustered B) Distributed C) External D) Hypermedia Answer: B Page Ref: 600 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 11) If a distributed database contains the same database, it is called a ________ database. A) mirrored B) redundant C) replicated D) partitioned Answer: C Page Ref: 600 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 12) If a distributed database divides the database into nonoverlapping segments, it is called a(n) ________ database. A) mirrored B) replicated C) independent D) partitioned Answer: D Page Ref: 600 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
4 Copyright © 2014 Pearson Education, Inc.
13) Which of the following is an advantage of functional systems? A) They facilitate the integration of data across various business functions. B) Two order processing functional systems located in two different countries need not accommodate language and culture differences. C) They ensure that organizations do not suffer from islands of automation. D) They solve the problems of data isolation by integrating data into a database that provides a comprehensive and organization-wide view. Answer: B Page Ref: 601 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 14) Which of the following statements is true regarding inherent processes? A) Developing alternative international processes is easier than creating an accurate as-is international process management model. B) Determining the criteria to be used for evaluating the alternative international processes takes little time. C) Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way. D) In the future, it is likely that international business processes will no longer be developed more like interorganizational business processes. Answer: C Page Ref: 601 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the role of information systems in supporting business processes 15) The phenomenon in which the variability in the size and timing of orders increases at each stage of the supply chain is known as the ________ effect. A) accelerator B) butterfly C) bullwhip D) rainbow Answer: C Page Ref: 602 Difficulty: Easy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes
5 Copyright © 2014 Pearson Education, Inc.
16) Because of the ________ effect, a dollar spent will contribute two or three dollars of activity to the economy. A) distribution B) bullwhip C) butterfly D) accelerator Answer: D Page Ref: 602 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 17) Which of the following is true regarding the challenges of international information system management? A) Standardizing business processes is a good method to overcome the challenges posed by international information system management. B) Running hardware in different countries poses a problem. C) The procedures for using a customer relationship management system remain the same irrespective of the country where it is used. D) The purpose and the scope of a system are determined in the requirement analysis stage of the software development life cycle. Answer: A Page Ref: 604 Difficulty: Easy Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes True or False 1) With the fall of the Soviet Union, the economies of Russia and western Europe became alienated from the rest of the world market. Answer: FALSE Page Ref: 596 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage
6 Copyright © 2014 Pearson Education, Inc.
2) The global economy has intensified rivalry by increasing product and vendor choices and by accelerating the flow of information about price, product, availability, and service. Answer: TRUE Page Ref: 597 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) The size of the world economy, combined with the Internet, limits product differentiation. Answer: FALSE Page Ref: 597 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 4) Because of information systems, value chain activities can be performed from anywhere in the world. Answer: TRUE Page Ref: 598 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 1 Learning Outcome: Explain how IS can be used to gain and sustain competitive advantage 5) World time differences enable global virtual companies to operate 24/7. Answer: TRUE Page Ref: 598 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Discuss the role of information systems in supporting business processes 6) Internationalization has a huge impact on computer hardware. Answer: FALSE Page Ref: 598 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes
7 Copyright © 2014 Pearson Education, Inc.
7) Information systems procedures need to reflect local cultural values and norms. Answer: TRUE Page Ref: 599 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 2 Learning Outcome: Discuss the role of information systems in supporting business processes 8) To localize a computer program, all you need to do is hire a translator to convert it from one language to another. Answer: FALSE Page Ref: 599 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 9) International companies that have a single database must declare a single language for the company. Answer: TRUE Page Ref: 600 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 10) Cross-functional, integrated systems, such as Enterprise Resource Planning (ERP), add to the problems of data isolation. Answer: FALSE Page Ref: 601 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 11) Differences in language, culture, norms, and expectations compound the difficulties of international process management. Answer: TRUE Page Ref: 601 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 8 Copyright © 2014 Pearson Education, Inc.
12) Information systems increase inventories. Answer: FALSE Page Ref: 602 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 13) The bullwhip effect is a phenomenon in which the variability in the size and timing of orders increases at each stage of the supply chain. Answer: TRUE Page Ref: 602 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 4 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 14) Information systems support just-in-time (JIT) inventory techniques. Answer: TRUE Page Ref: 602 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects 15) The accelerator effect states that a dollar spent will contribute two or three dollars of activity to the economy. Answer: TRUE Page Ref: 602 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 4 Learning Outcome: Discuss the role of information systems in supporting business processes 16) The purpose and scope of the system is determined in the systems definition stage of the Software Development Life Cycle (SDLC). Answer: TRUE Page Ref: 604 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes
9 Copyright © 2014 Pearson Education, Inc.
17) Defining a set of standard business processes is a way of developing international information systems. Answer: TRUE Page Ref: 604 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes 18) The development rate of international information systems varies among countries and cultures. Answer: TRUE Page Ref: 605 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the role of information systems in supporting business processes Essay 1) How does the global economy change competitive strategy? Answer: Today's global economy changes thinking about competitive strategies in two major ways. First, the sheer size and complexity of the global economy means that any organization that chooses a strategy allowing it to compete industry-wide is taking a very big risk. Competing in many different countries, with products localized to the language and culture of those countries, is an enormous and expensive task. The second major way today's world economy changes competitive strategies is that its size, combined with the Internet, enables unprecedented product differentiation. Page Ref: 597 Difficulty: Easy AACSB: Dynamics of the Global Economy Study Question: Study Question 1 Learning Outcome: Describe the effects of e-commerce on the modern business world
10 Copyright © 2014 Pearson Education, Inc.
2) What are the issues that have to be addressed when localizing a computer program? Answer: The process of making a computer program work in a second language is called localizing. The following issues have to be addressed while localizing a computer program: a. The user interface, including menu bars and commands, has to be translated. b. The labels in forms, reports, and query prompts have to be translated and possibly redesigned. c. All documentation and help text have to be translated. d. All the diagrams and examples in the help text have to be redrawn and translated. e. All the error messages have to be translated. f. The text in all message boxes has to be translated. g. Sorting order for the different character sets has to be adjusted. h. Special problems in Asian character sets and in languages that read and write from right to left have to be fixed. Page Ref: 599 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 2 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure 3) What are the problems of inherent processes? Answer: Each software product assumes that the software will be used by people filling particular roles and performing their actions in a certain way. ERP vendors justify this standardization by saying that their procedures are based on industry-wide best practices and that the organization will benefit by following these standard processes. This statement may be true, but some inherent processes may conflict with cultural norms. If they do, it becomes difficult for the management to convince the employees in such cultures to follow those inherent processes. Differences in language, culture, norms, and expectations compound the difficulties of international process management. Just creating an accurate as-is model is difficult and expensive in itself. Thus, developing alternative international processes and evaluating them becomes incredibly challenging. With cultural differences, it becomes difficult to determine what criteria should be used for evaluating the alternatives and also for performing the evaluation. Page Ref: 601 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 3 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
11 Copyright © 2014 Pearson Education, Inc.
4) How do global information systems affect supply chain profitability? Answer: Global information systems increase supply chain profitability. Supply chain performance is driven by four factors: facilities, inventories, transportation, and information. Every one of these drivers is positively affected by global information systems. Because of global information systems, facilities can be located anywhere in the world. Information systems reduce inventories and hence save costs. They can be used to reduce or eliminate the bullwhip effect. They also support just-in-time (JIT) inventory techniques worldwide. Information systems allow businesses to choose the delivery option that optimizes the value they generate. Finally, global information systems produce comprehensive, accurate, and timely information. Page Ref: 602 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 4 Learning Outcome: Discuss best practices for selecting, evaluating, and managing information systems projects
12 Copyright © 2014 Pearson Education, Inc.
5) What are the challenges of international information systems management? Answer: Managing a global information systems development project is difficult because of project size and complexity. Project integration is difficult because international development projects require the complex integration of results from distributed workgroups. Also, task dependencies can span teams working in different countries, increasing the difficulty of task management. Time management becomes difficult because teams in different cultures and countries work at different rates. Some cultures have a 35-hour workweek, and some have a 60-hour workweek. Some cultures expect 6-week vacations, and some expect 2 weeks. Some cultures thrive on efficiency of labor, and others thrive on considerate working relationships. Thus, there is no standard rate of development for an international project. In terms of cost, different countries and cultures pay vastly different labor rates. Using critical path analysis, managers may choose to move a task from one team to another. Doing so, however, may substantially increase costs. Thus, management may choose to accept a delay rather than move work to an available but more expensive team. The complex trade-offs that exist between time and cost become even more complex for international projects. Quality and human resources are also more complicated for international projects. Quality standards vary among countries. Thus, the integration of programs of varying quality results in an inconsistent system. Worker expectations vary among cultures and nations. Compensation, rewards, and worker conditions vary, and these differences can lead to misunderstandings, poor morale, and project delays. Because of these factors, effective team communication is exceedingly important for international projects, but because of language and culture differences and geographic separation, such communication is difficult. Effective communication is also more expensive. Finally, project procurement is complicated by the normal challenges of international commerce. Page Ref: 603-605 Difficulty: Easy AACSB: Use of Information Technology Study Question: Study Question 5 Learning Outcome: Discuss the key issues involved in managing the components of IT infrastructure
13 Copyright © 2014 Pearson Education, Inc.