BAM 509 FINAL EXAM(1-50)

profilenewman
 (Not rated)
 (Not rated)
Chat

1.    The three activities in an information system that produce the information organizations use to
control operations are:
a.    input, output, and feedback.
b.    input, processing, and output.
c.    data analysis, processi ng, and feed back.
d.    information retrieval, research, and analysis.
2. Converting raw data into a more meaningful form is called:
a.    processi ng.
b.    organizing.
c.    capturing.
d.    feedback.
3.    The fundamental set of assumptions, values, and ways of doing things that has been accepted
by most of a company's members is called its:
a.    atmosphere.
b.    environment.
c.    culture.
d.    values.
4. The hardware and software used to transfer data in an organization is called:
a.    networking and telecommunications technology.
b.    data management technology.
c.    networking and data management technology.
d.    data and telecommunications technology.
5.    Networking and telecommunications technologies, along with computer hardware, software,
data management technology, and the people required to run and manage them, constitute an
organization's:
a.    networked environment.
b.    data management environment.
c.    information system.
d.    IT infrastructure.
3
 
e.   
6. An example of a business using information systems for customer and supplier intimacy is:
a.    Wal-Mart's RetailLink system.
b.    the Mandarin Oriental hotel's customer-preference tracking system.
c.    Apple Inc.'s iPod.
d.    Verizon's Web-based digital dashboard.
7.    A corporation that funds a political action committee, which in turn promotes and funds a
political candidate who agrees with the values of that corporation, could be seen as investing in
which main category of complementary assets?
a.    Social
b.    Organizational
c.    Governmental
d.    Managerial
8.    Apple Computer dominates the online legal music sales industry primarily because of a failure
of recording label companies to:
a.    modernize their information value chain.
b.    adopt a new business model.
c.    invest in technology.
d.    invest in complementary assets.
9. Disciplines that contribute to the technical approach to information systems are:
a.    engineering, utilization management, and computer science.
b.    management science, computer science, and engineering.
c.    computer science, engineering, and networking.
d.    operations research, management science, and computer science.
10.    Which field of study focuses on both a behavioral and technical understanding of information
systems?
a.    Management information systems
b.    Economics
c.    Operations research
d.    Sociology
    11. Identifying customers is a responsibility of the     function.
a.    finance and accounting
b.    sales and marketing
c.    manufacturing and production
d.    human resources
4
 
f.   
12. All of the following statements regarding Lotus Notes are true except for:
a.    It began as an e-mail and messaging client.
b.    It is the most widely used collaboration tool at Fortune 1000 companies.
c.    It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.
d.    Firmwide installations at a large company require specialized servers and may cost
millions of dollars per year.
13.    Which type of system would you use to determine what trends in your supplier's industry will
affect your firm the most in five years?
a.    ESS
b.    DSS
c.    MIS
d.    TPS
14. What is the most important function of an enterprise application?
a.    Enabling a company to work collaboratively with customers and suppliers
b.    Enabl i ng cost-effective e-busi ness processes
c.    Increasing speed of communicating
d.    Enabling business functions and departments to share information
15.    The point-of-sale Pulse system used by Domino's to maintain consistent and efficient
management functions in its restaurants is best categorized as which type of system?
a.    DSS
b.    CRM
c.    TPS
d.    more than one of the above
16.    In Domi no's upgraded Pulse Evol ution system, it incorporated a Pizza Tracker functional ity
that shows the progression of individual pizza orders. This is an example of using information
systems to achieve which business objective?
a.    Improved decision making
b.    Operational excellence
c.    Survival
d.    Customer and supplier intimacy
5
 
g.   
17. The four major enterprise appl ications are:
a.    SCMs, CRMs, DSSs, and KMSs.
b.    enterprise systems, SCMs, CRMs, and KMSs.
c.    enterprise systems, SCMs, DSSs, and CRMs.
d.    SCMs, CRMs, ESSs, and KMSs.
18.    You are planning the launch of your new company, an application service provider that
provides an online timesheet and project tracking application. To best communicate with and
manage your relationship with your users, you would want to implement atn).
a.    CMS.
b.    KMS.
c.    intranet.
d.    extra n et.
19.    Which of the following types of system helps expedite the flow of information between the firm
and its suppliers and customers?
a.    KMS
b.    extra net
c.    intranet
d.    TPS
20.    The use of digital technology and the Internet to execute the major business processes in the
enterprise is called:
a.    enterprise applications.
b.    e-commerce.
c.    MIS.
d.    e-business.
21. The CPO is responsi ble for:
a.    overseeing the use of information technology in the firm.
b.    making better use of existing knowledge in organizational and management processes.
c.    enforcing the firm's information security policy.
d.    ensuring that the company complies with existing data privacy laws.
22. Wh ich of the followi ng is not one of the fifteen categories of collaborative software tools?
a.    Event scheduling
b.    White boarding
c.    File sharing
d.    Extranets
6
 
h.   
23.    As discussed in the chapter opening case, which of the four generic strategies did Verizon
employ to combat the competition offered by AT&T?
a.    Customer and supplier intimacy
b.    Product differentiation
c.    Focus on market niche
d.    Low-cost leadership
24.    How does the technical view of organizations fall short of understanding the full impacts of
information systems in a firm?
a.    It sees the organization as a social structure similar to a machine.
b.    It sees information systems as a way to rearrange the inputs and outputs of the
organ ization.
c.    It sees the inputs and outputs, labor and capital, as being infinitely malleable.
d.    It sees capital and labor as primary production factors.
25.    According to the     definition of organizations, an organization is seen as a means by
which primary production factors are transformed into outputs consumed by the environment.
a.    microeconomic
b.    behavioral
c.    sociotechnical
d.    macroeconomic
26.    All of the following are major features of organizations that impact the use of information
systems EXCEPT for:
a.    goals.
b.    environments.
c.    agency costs.
d.    busi ness processes.
27. Business processes are collections of:
a.    routines.
b.    formalized and documented practices.
c.    informal practices and behaviors.
d.    rights and privi leges.
28.    According to Leavitt's model of organizational resistance, the four components that must be
changed in an organization in order to successfully implement a new information system are:
a.    tasks, technology, people, and structure.
b.    technology, people, culture, and structure.
c.    organization, culture, management, and environment
d.    environment, organization, structure, tasks.
7
 
i.   
29.    Amazon's use of the Internet as a platform to sell books more efficiently than traditional
bookstores illustrates which type of competitive strategy:
a.    marketi ng effectiveness.
b.    strengthening supplier intimacy.
c.    focusi ng on market niche.
d.    low-cost leadership.
30.    Hilton Hotels' use of customer information software to identify the most profitable customers
to direct services to is an example of using information systems to:
a.    strengthen customer intimacy.
b.    differentiate their service.
c.    increase efficiency.
d.    focus on market niche.
31. An example of synergy in business is:
a.    Blockbuster combining traditional video rental with online video rental.
b.    Wal-Mart's order entry and inventory management system to coordinate with suppliers.
c.    Amazon's use of the Internet to sell books.
d.    JP Morgan Chase's mergers with other banks that provided JP Morgan with a network
of retail branches in new regions.
32. A virtual company:
a.    uses Internet technology to maintain a networked community of users.
b.    uses Internet technology to maintain a virtual storefront.
c.    provides entirely Internet-driven services, or virtual products.
d.    uses the capabilities of other companies without being physically tied to those
companies.
33. Which of the following best describes how new information systems result in legal gray areas?
a.    They work with networked, electronic data, which are more difficult to control than
information stored man ually.
b.    They are implemented by technicians rather than managers.
c.    They result in new situations that are not covered by old laws.
d.    They are created from sets of logical and technological rules rather than social or
organ izational mores.
34.    Which of the five moral dimensions of the information age do the central business activities of
ChoicePoint raise?
a.    System quality
b.    Property rights and obi igations
c.    I nformation rights and obi igations
d.    Accountability and control
8
 
j.   
35. The feature of social institutions that means mechanisms are in place to determine
responsibility for an action is called:
a.    the judicial system.
b.    the courts of appeal.
c.    due process.
d.    accountability.
36.    Which of the following is not one of the five steps discussed in the chapter as a process for
analyzing an ethical issue?
a.    Identify the stakeholders.
b.    Identify and clearly describe the facts.
c.    Assign responsibility.
d.    Identify the options you can reasonably take.
37. The Federal Trade Commission FIP principle of Notice/Awareness states that:
a.    data collectors must take responsible steps to assure that consumer information is
accurate and secure from unauthorized use.
b.    customers must be allowed to choose how their information will be used for secondary
purposes other than the supporting transaction.
c.    Web sites must disclose their information practices before collecting data.
d.    there is a mechanism in place to enforce FIP principles.
    38. European privacy protection is     than in the United States.
a.    much more stringent
b.    less liable to laws
c.    less far-reaching
d.    much less stringent
39.    What legal mechanism protects the owners of intellectual property from having their work
copied by others?
a.    Patent protection
b.    Fair use doctrine
c.    Intellectual property law
d.    Copyright law
40. Two of the three principal sources of poor system performance are:
a.    hardware or facility failures and malware.
b.    software bugs and errors and outdated standards.
c.    hardware or facility failures and poor input data quality.
d.    poor input data quality and insufficient integration with legacy systems.
9
 
k.   
41. CVS refers to:
a.    eyestrain related to computer display screen use.
b.    wrist injuries brought about by incorrect hand position when using a keyboard.
c.    carpal vision syndrome.
d.    stress induced by technology.
42. Which of the following is NOT an IT infrastructure service component?
a.    Physical facility management to manage the facilities housing physical components
b.    Computing platforms to provide a coherent digital environment
c.    IT management services to plan and develop the infrastructure and provide
project management
d.    Operating system software
43. In a multi-tiered network:
a.    processing is split between clients and servers.
b.    processing is handled by multiple, geographically remote clients.
c.    the work of the entire network is centralized.
d.    the work of the entire network is balanced over several levels of servers.
    44.     unleash powerful economies of scale and result in declines in manufactured
computer products.
a.    CI ientlserver tech nologies
b.    I nternet and web technologies
c.    Technology standards
d.    Linux and open-source software
    45. A SAN is a     network.
a.    server area
b.    service-oriented arch itecture
c.    scalable architecture
d.    storage area
46. The leading networking hardware providers include:
a.    Dell, HP/Compaq, and IBM.
b.    IBM, Oracle, and Sun.
c.    Cisco, Alcatel-Lucent, and Nortel.
d.    Seagate, Maxtor, and Western Digital.
10
 
l.   
47. Which of the following is NOT an example of the emerging mobile computing platforms?
a.    netbooks
b.    CRM
c.    cell phones
d.    the Kindle
48. Linux is:
a.    an example of open-source software.
b.    especially useful for processing numeric data.
c.    designed for specific machines and specific microprocessors.
d.    primarily concerned with the tasks of end users.
49. What is the foundation technology for Web services?
a.    HTML
b.    UDDI
c.    SOAP
d.    XML
50.    Which of the following is NOT one of the main six factors to consider when evaluating how
much your firm should spend on IT infrastructure?
a.    Your firm's organizational culture
b.    Your firm's business strategy
c.    Market demand for your firm's services
d.    The IT investments made by competitor firms

    • 11 years ago
    BAM 509 FINAL EXAM(1-50)
    NOT RATED

    Purchase the answer to view it

    blurred-text
    • attachment
      bam_509_final_exam1-50.doc