C
26) The ________ consists of systems analysts, specialists
from the relevant end-user business areas, application
programmers, and perhaps database specialists.
A. project management group
B. project team
C. IS steering committee
D. corporate strategic planning committee
B
27) A CSF approach to establishing an enterprise's
information requirements is especially suitable for
A. distinguishing between individual and organizational
objectives.
B. identifying the key entities and attributes of the
organization's data.
C. understanding how organizational units define critical
data.
D. the development of DSSs and ESSs.
D
28) A road map indicating the direction of systems
development, the rationale, the current systems, new
developments to consider, the management strategy,
the implementation plan, and the budget is called a(n)
A. project plan.
B. portfolio analysis.
C. information systems plan.
D. enterprise analysis.
C
29) The principle method used in CFS analysis is to
A. inventory all of the organization's information
systems projects and assets and assign risk levels.
B. perform a weighted comparison of the criteria used to
evaluate a system.
C. survey a large sample of managers on their
objectives, decision-making process, and uses and
needs for data and information.
B. scoring model
C. portfolio analysis
D. CSF
C
34) The central method used in a scoring model is to
A. inventory all of the organization's information
systems projects and assets.
B. perform a weighted comparison of the criteria used to
evaluate a system.
C. survey a large sample of managers on their
objectives, decision-making process, and uses and
needs for data and information.
D. interview a small number of top managers to identify
their goals and criteria for achieving success.
B
35) You have been hired by a pharmaceutical company
to evaluate its inventory of systems and IT projects.
Which types of projects would be best avoided?
A. any high risk projects
B. any low-benefit projects
C. all high-risk, low benefit projects
D. none, any project might be beneficial.
C
36) Which method is used to assign weights to various
features of a system?
A. information systems plan
B. scoring model
C. portfolio analysis
D. CSF
B
37) The criteria used for evaluation in a scoring model
are usually determined by
A. lengthy discussions among the decision-making
group.
B. a CSF analysis.
C. the IS steering committee.
D. systems analysts.
A
38) ________ are all intangible benefits of information
systems.
A. Improved asset utilization, increased organizational
learning, and improved operations
B. Reduced workforce, lower outside vendor costs, and
increased productivity
C. Increased productivity, reduced workforce, and
increased job satisfaction
D. Lower operational costs, improved resource control,
and more information
A
39) ________ are all tangible benefits of information
systems.
A. Improved asset utilization, increased organizational
learning, and improved operations
B. Reduced workforce, lower outside vendor costs, and
increased productivity
C. Increased productivity, reduced workforce, and
increased job satisfaction
D. Lower operational costs, improved resource control,
and more information
B
40) The worth of systems from a financial perspective
essentially revolves around the issue of
A. CSFs.
B. adherence to information requirements.
C. asset utilization.
D. return on invested capital.
D
41) When using a capital budgeting method in
measuring the worth of an information system, which of
the following related costs would you use to assess the
cash inflow?
A. increased sales of products
D
54) Which of the following types of projects is most
likely to fail?
A. integration of an third-party automated payment
system
B. replacement of middleware with Web services for
legacy application integration
C. a business process redesign project that restructures
workflow and responsibilities
D. redesigning a user interface to an online investment
site
C
55) Which of the following is NOT a responsibility of
effective change management?
A. integrating legacy systems
B. dealing with fear and anxiety about new systems
C. training users of the new system
D. enforcing user participation at all stages of system
development
A
56) Which of the following tools would you use to
control risk factors in an information systems project?
A. internal integration tools
B. external integration tools
C. formal planning tools and formal control tools
D. All of the above
D
57) Internal integration tools:
A. enable a project to have sufficient technical support
for project management and development.
B. enable a project manager to properly document and
monitor project plans.
C. portray a project as a network diagram with
numbered nodes representing project tasks.
In sociotechnical design
separate sets of technical and social design solutions are
developed and compared.
ergonomic features of a system and the system's
technical design are given equal importance.
systems analysts with proven backgrounds in
sociological concerns rate and compare a system's social
and technical aspects.
all of these.
separate sets of technical and social design solutions are
developed and compared.
In working with ROPMs and options valuation, a financial
option is a(n)
obligation to purchase an asset at a later date at a fixed
price.
obligation to either purchase or sell an asset at a later
date at a strike price.
right to purchase an asset a later date at a strike price.
right to purchase or sell an asset a later date at a fixed
price.
right to purchase or sell an asset a later date at a fixed
price.
In CFS analysis, it is important to
interview as many employees from different levels of the
company as possible
create a broad inquiry into the various types of
information used in the company.
60
50
When using a capital budgeting method in measuring
the worth of an information system, which of the
following related costs would you use to assess the cash
inflow?
increased sales of products
hardware and software expenditures
labor expenditures
reduced costs in production and operation
both increased sales of products and reduced costs in
production and operation
both hardware and software expenditures and labor
expenditures
increased sales of products, hardware and software
expenditures, labor expenditures and reduced costs in
production and operation
both increased sales of products and reduced costs in
production and operation
To review a project's tasks and their interrelationships,
you would use a
PERT chart.
Gantt chart.
Either PERT chart or Gantt chart.
Neither PERT chart nor Gantt chart.
PERT chart.
evaluate a system.
survey a large sample of managers on their objectives,
decision-making process, and uses and needs for data
and information.
interview a small number of top managers to identify
their goals and criteria for achieving success.
interview a small number of top managers to identify their
goals and criteria for achieving success.
Users prefer systems that
are oriented to facilitating organizational tasks and
solving business problems.
work with existing DBMS.
are able to provide optimum hardware and software
efficiency.
are capable of storing much more data than they need.
are oriented to facilitating organizational tasks and
solving business problems.
The project risk will rise if the project team and the IS
staff lack
legacy applications as a starting point.
good equipment.
the required technical expertise.
financial studies and plans.
the required technical expertise.
ROPMs value information systems similar to stock
options, in that
30%
On average, private sector IT projects underestimated
budget and delivery time of systems:
scope, time, cost, quality, and risk.
The major variables in project management are:
the corporate strategic planning group
At the top of the management structure for information
systems projects in a large company is:
project team
The ________ is directly responsible for the individual
systems project.
IS steering committee
The ________ reviews and approves plans for systems in all
divisions.
project team
Chapter 14
C) IS steering committee
D) corporate strategic planning committee
C) IS steering committee
The ________ consists of systems analysts, specialists
from the relevant end-user business areas, application
programmers, and perhaps database specialists.
A) project management group
B) project team
C) IS steering committee
D) corporate strategic planning committee
B) project team
The ________ is directly responsible for the individual
systems project.
A) project management group
B) project team
C) IS steering committee
D) corporate strategic planning committee
B) project team
A road map indicating the direction of systems
development, the rationale, the current systems, new
developments to consider, the management strategy,
the implementation plan, and the budget is called a(n)
A) project plan.
B) portfolio analysis.
C) information systems plan.
D) enterprise analysis.
C) information systems plan.
You have been hired to implement an enterprise system
that will automate much of the billing and accounting
work for a statewide HVAC services company. Which of
the following would you prepare to describe how the
new system will affect a firm's structure and operations?
A) information systems plan
B) internal integration report
C) sociotechnical design report
D) organizational impact analysis
system
B) replacement of middleware with Web services for
legacy application integration
C) a business process redesign project that restructures
workflow and responsibilities
D) redesigning a user interface to an online investment
site
C) a business process redesign project that restructures
workflow and responsibilities
Which of the following is not a responsibility of effective
change management?
A) integrating legacy systems
B) dealing with fear and anxiety about new systems
C) training users of the new system
D) enforcing user participation at all stages of system
development
A) integrating legacy systems
Which of the following tools would you use to control
risk factors in an information systems project?
A) internal integration tools
B) external integration tools
C) formal planning tools and formal control tools
D) A and B
E) A and C
F) all of the above
F) all of the above
Internal integration tools
A) enable a project to have sufficient technical support
for project management and development.
B) enable a project manager to properly document and
monitor project plans.
C) portray a project as a network diagram with
numbered nodes representing project tasks.
D) consist of ways to link the work of the
implementation team with users at all organization
levels.
A) PERT chart.
Which type of tool helps project managers identify
bottlenecks in project development?
A) internal integration tools
B) external integration tools
C) formal planning and control tools
D) both B and C
C) formal planning and control tools
External integration tools
A) enable a project to have sufficient technical support
for project management and development.
B) enable a project manager to properly document and
monitor project plans.
C) portray a project as a network diagram with
numbered nodes representing project tasks.
D) consist of ways to link the work of the
implementation team with users at all organization
levels.
D) consist of ways to link the work of the implementation
team with users at all organization levels.
An example of using an external integration tool would
be to
A) define task dependencies.
B) include user representatives as active members of the
project team.
C) create a PERT chart.
D) hold frequent project team meetings.
B) include user representatives as active members of the
project team.
Which of the following is not an organizational factor in
systems planning and implementation?
A) standards and performance monitoring
B) government regulatory compliance
C) health and safety
D) user interface
D) user interface
In sociotechnical design
A) separate sets of technical and social design solutions
are developed and compared.
B) ergonomic features of a system and the system's
technical design are given equal importance.
C) systems analysts with proven backgrounds in
sociological concerns rate and compare a system's social
and technical aspects.
D) all of the above
A) separate sets of technical and social design solutions
are developed and compared.
The most widely used project management software
today is
A) Vertabase.
B) IBM Project Guide.
C) Microsoft Project.
D) Microsoft Excel
C) Microsoft Project.
________ refers to the application of knowledge, skills,
tools and techniques to achieve specific targets within
specified budget and time constraints.
Project Mangement
One of the five major variables in project management,
________ is an indicator of how well the project satisfies
management objectives.
quality
A(n) ________ is a method for deciding among alternative
systems based on a system of ratings for selected
objectives
scoring model
The ________ is the part of the system that users interact
with.
user interface
The use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals is called
A) profiling.
B) phishing.
C) spamming.
D) targeting.
A
Which of the five moral dimensions of the information age do the central
business activities of ChoicePoint raise?
A) property rights and obligations
B) system quality
C) accountability and control
D) information rights and obligations
D
NORA is a
A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) data analysis technology that finds hidden connections between data in
disparate sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on
business executives.
C
A colleague of yours frequently takes for his own personal use small
amounts of office supplies, noting that the loss to the company is minimal.
You counter that if everyone were to take the office supplies, the loss would
no longer be minimal. Your rationale expresses which historical ethical
principle?
A) Kant's Categorical Imperative
B) the Golden Rule
C) the Risk Aversion Principle
D) the "No free lunch" rule
A
B) one should take the action that produces the least harm or incurs the
least cost.
C) one can put values in rank order and understand the consequences of
various courses of action.
D) if an action is not right for everyone to take, it is not right for anyone to
take.
D
Which of the following is not one of the practices added in 2010 by the FTP
to its framework for privacy?
A) Firms should build products and services that protect privacy.
B) Firms should increase the transparency of their data collection.
C) Firms should require consumer consent and provide clear options to opt
out of data collection.
D) Firms should limit the length of time that any personal data is stored to
six months or less.
D
Which of the following U.S. laws gives patients access to personal medical
records and the right to authorize how this information can be used or
disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
A
trade secret.
C) Software that contains unique elements can be claimed as a trade secret.
D) Trade secret law protects the actual ideas in a product.
B
Which of the following adjusts copyright laws to the Internet age by making
it illegal to circumvent technology-based protections of copyrighted
materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
A
________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
A
Which of the five moral dimensions of the information age does spamming
raise?
A) quality of life
B) system quality
C) accountability and control
D) information rights and obligations
A
Which two of the following issues are privacy advocates and advertising
industry most in conflict over? (Select two of the following.)
A) an opt-in policy required at all sites
B) a national Do-Not-Track list
C) an opt-out policy required at all sites
D) disclosure and transparency in the use of Flash or super cookies
A,B
23) In the information age, the obligations that individuals and organizations have
concerning rights to intellectual property fall within the moral dimension of
A) property rights and obligations.
B) system quality.
C) accountability and control.
D) information rights and obligations.
Answer: A
24) In the information age, the obligations that individuals and organizations have regarding
the preservation of existing values and institutions fall within the moral dimension of
A) family and home.
B) property rights and obligations.
C) system quality.
D) quality of life.
Answer: D
25) The four key technical trends responsible for current ethical stresses related to
information technology are (1) doubling of computer power every 18 months, (2) data
analysis advances, (3) declining data storage costs, and (4) ________.
A) advances in wireless networking
B) international standards for data protection
C) networking advances and the Internet
D) increased ease in file sharing and copying
Answer: C
26) The use of computers to combine data from multiple sources and create electronic
dossiers of detailed information on individuals is called
A) profiling.
B) phishing.
C) spamming.
D) targeting.
Answer: A
27) Which of the five moral dimensions of the information age do the central business
activities of ChoicePoint raise?
A) property rights and obligations
B) system quality
28) NORA is a
A) profiling technology used by the EU.
B) federal privacy law protecting networked data.
C) new data analysis technology that finds hidden connections between data in disparate
sources.
D) sentencing guideline adopted in 1987 mandating stiff sentences on business executives.
Answer: C
29) Accepting the potential costs, duties, and obligations for the decisions you make is
referred to as
A) responsibility.
B) accountability.
C) liability.
D) due process.
Answer: A
30) The feature of political systems in which a body of laws is in place that permits
individuals to recover the damages done to them by other actors, systems, or organizations
is referred to as
A) accountability.
B) responsibility.
C) due process.
D) liability.
Answer: D
31) The feature of social institutions that means mechanisms are in place to determine
responsibility for an action is called
A) due process.
B) accountability.
C) the courts of appeal.
32) The process in law-governed societies in which laws are known and understood and
there is an ability to appeal to higher authorities to ensure that the laws are applied correctly
is called
A) liability.
B) due process.
C) the courts of appeal.
D) accountability.
Answer: B
33) Which of the following is notone of the five steps discussed in the chapter as a process
for analyzing an ethical issue?
A) Assign responsibility.
B) Identify the stakeholders.
C) Identify the options you can reasonably take.
D) Identify and clearly describe the facts.
Answer: A
34) A colleague of yours frequently takes for his own personal use small amounts of office
supplies, noting that the loss to the company is minimal. You counter that if everyone were
to take the office supplies, the loss would no longer be minimal. Your rationale expresses
which historical ethical principle?
A) Kant's Categorical Imperative
B) The Golden Rule
C) The Risk Aversion Principle
D) The "No free lunch" rule
Answer: A
35) A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store
in order to feed his starving family. If you used the Utilitarian Principle to evaluate this
situation, you might argue that stealing the food is
A) acceptable, because the grocer suffers the least harm.
B) acceptable, because the higher value is the survival of the family.
C) wrong, because the man would not want the grocery to steal from him.
D) wrong, because if everyone were to do this, the concept of personal property is defeated.
Answer: B
38) According to the ________, you should take the action that produces the least harm.
A) Categorical Imperative
B) Risk Aversion Principle
C) Utilitarian Principle
D) Golden Rule
Answer: B
39) Which U.S. act restricts the information the federal government can collect and regulates
what they can do with the information?
A) Privacy Act of 1974
B) Gramm-Leach-Bliley Act of 1999
41) The Federal Trade Commission FIP principle of Notice/Awareness states that
A) customers must be allowed to choose how their information will be used for secondary
purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is
accurate and secure from unauthorized use.
C) there is a mechanism in place to enforce FIP principles.
D) Web sites must disclose their information practices before collecting data.
Answer: D
42) Which of the following U.S. laws gives patients access to personal medical records and
the right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
Answer: A
45) The U.S. Department of Commerce developed a ________ framework in order to enable
U.S. businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) safe-harbor
Answer: D
47) A(n) ________ model of informed consent permits the collection of personal information
until the consumer specifically requests that the data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP
Answer: B
Answer: A
49) The robotics startup you work for has developed an AI-controlled robotic nurse, intended
to care for end-of-life patients who are often unconscious. Which of the five moral
dimensions does this raise?
A) system quality
B) quality of life
C) accountability and control
D) property rights and obligations
Answer: B
53) What legal mechanism protects the owners of intellectual property from having their work
copied by others?
A) patent protection
54) "Look and feel" copyright infringement lawsuits are concerned with
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
Answer: B
57) Which of the following adjusts copyright laws to the Internet age by making it illegal to
circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
Answer: A
58) In general, it is very difficult to hold software producers liable for their software products
when those products are considered to be
A) part of a machine.
B) similar to books.
C) services.
D) artistic expressions.
Answer: B
61) Software presents liability problems in terms of legal protections for users because
A) of the difficulty in classifying its role as a machine, a service, or a book.
B) of the inability to review the actual programming behind the software.
C) of its inherent similarity to books and periodicals, and therefore it is protected by the First
Amendment.
D) there are so many parties involved in its creation and distribution.
Answer: A
62) Two of the three principal sources of poor system performance are
A) software bugs and errors and outdated standards.
B) hardware or facility failures and malware.
C) hardware or facility failures and poor input data quality.
D) poor input data quality and insufficient integration with legacy systems.
Answer: C
68) The term "________ divide" refers to large disparities in access to computers and the
Internet among different social groups and different locations.
A) computer
B) technology
C) digital
D) electronic
Answer: C
69) ________ can be induced by tens of thousands of repetitions under low-impact loads.
A) CTS
B) CVS
C) RSI
D) Technostress
Answer: C
They result in new situations that are not covered by old laws
Which of the following best describes how new information systems result in
legal gray areas?
quality of life
In the information age, the obligations that individuals and organizations have
regarding the preservation of existing values and institutions fall within the
moral dimension of:
profiling
The use of computers to combine data from multiple sources and create
electronic dossiers of detailed information on individuals is called
new data analysis technology that finds hidden connections between data in
disparate sources
NORA is a
responsibility
Accepting the potential costs, duties, and obligations for the decisions you
make is referred to as:
Firms should limit the length of time that any personal data is stored to six
months or less
Which of the following is not one of the practices added in 2010 by the FTC to
its framework for privacy
Accountability
The feature of social institutions that means mechanisms are in place to
determine responsibility for an action is called:
due process
The practice in law-governed societies in which laws are known and
understood, and there is an ability to appeal to higher authorities to ensure
that the laws are applied correctly is called
Assign responsibility
Which of the following is not one of the five steps discussed in the chapter as
a process for analyzing an ethical issue
A colleague of yours frequently takes, for his own personal use, small
amounts of office supplies noting that the loss to the company is minimal.
You counter that if everyone were to take office supplies the loss would no
longer be minimal. Your rationale expresses which historical ethical principle?
if an action is not right for everyone to take, it is not right for anyone to take
Immanuel Kant's Categorical Imperative states that
Web sites must disclose their information practices before collecting data
The Federal Trade Commission FIP principle of Notice/Awareness states that:
HIPAA
Which of the following U.S. laws gives patients access to personal medical
records and the right to authorize how this information can be used or
disclosed
safe-harbour
the U.S. Department of Commerce developed a ________ framework in order to
enable U.S. businesses to legally use personal data from EU countries.
opt-out
A(n) ________ model of informed consent permits the collection of personal
information until the consumer specifically requests that the data not be
collected.
birthplace
Types of information gathered by Web site tracking tools include all of the
following except
Software products are more easily compared to each other than books.
Which of the following statements does not describe a key difference between
software and books?
Copyright law
What legal mechanism protects the owners of intellectual property from
having their work copied by others
similar to books
In general, it is very difficult to hold software producers liable for their
software products when those products are considered to be
data quality
The most common source of business system failure is
Quality of life
Which of the five moral dimensions of the information age does spamming
raise?
digital
The term "________ divide" refers to large disparities in access to computers
and the Internet among different social groups and different locations
RSI
________ can be induced by tens of thousands of repetitions under low-impact
loads.
behavioral targeting
Advertisers use ________ in order to display more relevant ads based on user's
search and browsing history.
opt-in
The ________ model prohibits an organization from collecting any personal
information unless the individual specifically takes action to approve
information collection and use.
patent
A(n) ________ grants the owner an exclusive monopoly on the ideas behind an
invention for 20 years.
Chapter 11
a
What was the primary problem facing the Girl Scouts
regarding their supply chain problems?
A) The ordering process was inefficient for a large volume
of orders.
B) There were high error rates in ordering and fulfillment.
C) It required too much time of volunteers.
D) The paper-based system was outdated.
a
Order the following steps in the systems development
lifecycle in the correct sequence.
A) Systems analysis, systems design, programming,
testing, conversion, production and maintenance
B) Systems analysis, systems design, programming,
conversion, testing, production and maintenance
C) Systems design, systems analysis, programming,
conversion, production and maintenance, and testing
D) Systems design, systems analysis, programming,
testing, conversion, production and maintenance
c
Which of the following is not part of the implementation
process?
A) rounded boxes.
B) square boxes.
C) circles.
D) open rectangles
d
Transferring data from a legacy system to the new system
would be defined by which system design specification
category?
A) Input
B) Database
C) Manual procedures
D) Conversion
a
In object-oriented development:
A) an object combines data and processes that act on the
data into a single object.
B) data is separated into discrete, reusable objects that
any processes may act upon.
C) an object comprises a single, reusable program that
can be combined with other objects to form a robust
application.
D) data categories are described as distinct objects, which
can share characteristics with other objects.
b
Which of the following is not one of the unique
considerations in developing applications for a mobile
platform?
A) Reduced screen space
B) Keyboard configuration
C) User gestures
D) Bandwidth constraints
c
Unit testing:
A) includes all the preparations for the series of tests to
be performed on the system.
B) tests the functioning of the system as a whole.
A) phased approach
B) direct cutover
C) indirect cutover
D) incremental conversion
c
Changes in hardware, software, documentation, or
production to a production system to correct errors, meet
new requirements, or improve processing efficiencies are
termed:
A) compliance.
B) production.
C) maintenance.
D) acceptance.
d
The oldest method for building information systems is:
A) component-based development.
B) prototyping.
C) object-oriented development.
D) the systems development lifecycle
d
In the traditional systems development lifecycle, end
users:
A) are important and ongoing members of the team from
the original analysis phase through maintenance.
B) are important only in the testing phases.
C) have no input.
D) are limited to providing information requirements and
reviewing the technical staff's work
b
As a technical project manager you have decided to
propose implementing a prototyping methodology for a
small Web-based design project. What is the order of
steps you will follow in this project?
A) Develop the prototype, use the prototype, revise and
enhance the prototype.
B) Identify user requirements, develop the prototype, use
a
"Hidden costs," such as ________ costs, can easily undercut
anticipated benefits from outsourcing.
A) vendor selection
B) hardware
C) software
D) employee salary
a
The process of creating workable information systems in a
very short period of time is called:
A) RAD.
B) JAD.
C) prototyping.
D) end-user development
b
This type of systems development is characterized by
significantly speeding the generation of information
requirements and involving users at an intense level in the
systems design.
A) RAD
B) JAD
C) Prototyping
D) End-user development
c
The term structured, when discussing structured
methodologies, refers to the fact that:
A) the finished software is highly documented.
B) the development process is highly documented.
C) the techniques are step by step, with each step building
on the previous one.
D) a defined hierarchy of objects and classes are used to
structure the programming
d
The primary tool for representing a system's component
processes and the flow of data between them is the:
A) data dictionary.
A) Native design
B) Responsive design
C) End-user design
D) Multi-platform design
a
________ provides software tools to automate development
methodologies and reduce the amount of repetitive work
in systems development.
A) CASE
B) CAD
C) JAD
D) RAD
c
________ refers to the application of knowledge, skills,
tools, and techniques to achieve specific targets within
specified budget and time constraints.
A) Systems analysis
B) Systems design
C) Project management
D) Project implementation
a
A PERT chart:
A) portrays a project as a network diagram consisting of
numbered nodes that represent tasks.
B) is used to evaluate project risk and time.
C) displays a horizontal bar for each project task.
D) tracks progress of, and modifications to, project tasks
b
________ are tangible benefits of information systems.
A) Improved asset utilization, increased organizational
learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and
increased productivity
C) Increased productivity, reduced workforce, and
increased job satisfaction
The project risk will rise if the project team and the IS staff
lack:
A) RAD experience.
B) web services.
C) the required technical expertise.
D) CASE tools.
a
Users prefer systems that:
A) are oriented to facilitating organizational tasks and
solving business problems.
B) work with existing DBMS.
C) are able to provide optimum hardware and software
efficiency.
D) are capable of storing much more data than they need
d
A ________ shows each task as a horizontal bar whose
length is proportional to the time required to complete it.
A) PERT chart
B) DFD
C) feasibility study
D) Gantt chart
b
Which of the following tools may help identify risk areas
associated with employee acceptance of a new information
system?
A) Formal planning software
B) Organizational impact analysis
C) System prototype
D) Feasibility study
c
A systems analysis includes a ________ that is used to
determine whether the solution is achievable from a
financial, technical, and organizational standpoint.
A) test plan
B) conversion plan
C) feasibility study
D) risk analysis
true
t/f A test plan includes all the preparations for the series
of tests to be performed on the system.
d
Which of the following Web development languages is
used for mobile applications because it supports crossplatform mobile applications?
A) Java
B) Javascript
C) XML
D) HTML5
false
t/f A prototype is the final working version of an
information system
a
A(n) ________ is a detailed list of questions submitted to
external vendors to determine how well they meet the
organization's specific requirements.
A) RFP
B) RFQ
C) RAD
D) JAD
true
t/f PaaS are online development environments that enable
developers to quickly write customer- or employee-facing
Web applications
a
________ describe the transformation occurring within the
lowest level of the data flow diagrams. They express the
logic of each process.
A) Process specifications
B) Structure charts
C) DFDs
D) Component procedures
true
t/f A reduced workforce is an example of a tangible
benefit of an information system
a
________ is a method for deciding among alternative
systems based on a system of ratings for selected
objectives.
A) A scoring model
B) A scorecard
C) Portfolio analysis
D) Risk analysis
21) Based on your reading of the chapter case
discussing PC Connection, their implementation of a
new order fulfillment system is an example of
A. BPR.
B. rationalization of procedures.
C. automation.
D. a paradigm shift.
B
22) The four kinds of structural organizational change
enabled by IT, in order from least to most risky, are
A. rationalization, automation, reengineering, and
redesigning.
B. rationalization, automation, reengineering, and
paradigm shift.
C. automation, rationalization, reengineering, and
paradigm shift.
D. automation, redesigning, restructuring, and
paradigm shift.
C
23) Business processes are analyzed, simplified, and
redesigned in
A. BPR.
B. rationalization of procedures.
C. automation.
D. a paradigm shift.
A
24) In automation
A. business processes are simplified.
B. business processes are reorganized to cut waste and
eliminate repetitive, paper-intensive tasks.
C. standard operating procedures are streamlined to
remove bottlenecks.
D. employees are enabled to perform their tasks more
efficiently.
D
25) Based on your reading of the chapter, the redesign
of mortgage application process by major mortgage
banks was an example of which type of organizational
change?
A. automation
B. paradigm shift
C. business process reengineering
D. restructuring
B
26) The process of streamlining business procedures so
that documents can be moved easily and efficiently is
called A. business process reengineering B. automation
C. work flow management D. rationalization
C
27) Which of the following statements about business
process reengineering is NOT true?
A. It is primarily an ongoing effort by a firm that
continually readjusts and measures the effectiveness of
new procedures.
B. It typically focuses on one or two strategic business
processes that need radical change.
C. systems design
D. test plan development
B
32) The entire system-building effort is driven by
A. organizational change.
B. feasibility studies.
C. the information value chain.
D. user information requirements.
D
33) Systems design:
A. describes what a system should do to meet
information requirements.
B. shows how the new system will fulfill the information
requirements.
C. identifies which users need what information, where,
when and how.
D. is concerned with the logical view of the system
solution.
B
34) System design specifications that address the
category of database design issues will include
specifications for
A. transaction volume and speed requirements.
B. data entry.
C. job design.
D. program logic and computations.
A
35) Transferring data from a legacy system to the new
system would be defined by which category of system
design specifications?
A. input
B. database
C. manual procedures
D. conversion
D
D
40) In a parallel conversion strategy, the new system
A. is tested by an outsourced company.
B. replaces the old one at an appointed time.
C. and the old are run together.
D. is introduced in stages.
C
41) In the direct cutover conversion strategy, the new
system
A. is tested by an outsourced company.
B. replaces the old one at an appointed time.
C. and the old are run together.
D. is introduced in stages.
B
42) Changes in hardware, software, documentation, or
production to a production system to correct errors,
meet new requirements, or improve processing
efficiencies are termed
A. compliance.
B. production.
C. maintenance.
D. acceptance.
C
43) In what stage of systems development are design
specifications created?
A. systems analysis
B. systems design
C. testing
D. conversion
B
44) The primary tool for representing a system's
component processes and the flow of data between
them is the
A. data dictionary.
B. process specifications diagram.
C. user documentation.
D. data flow diagram.
D
45) To understand and define the contents of data flows
and data store, system builders use
A. a data dictionary.
B. process specifications diagrams.
C. user documentation.
D. data flow diagrams.
A
46) To show each level of a system's design, its
relationship to other levels, and its place in the overall
design structure, structured methodologies use
A. structure charts.
B. Gantt and PERT charts.
C. process specifications.
D. data flow diagrams.
A
47) An entire information system is broken down into its
subsystems by using
A. high-level data flow diagrams.
B. low-level data flow diagrams.
C. process specifications.
D. structured diagrams.
A
48) In object-oriented development
A. the class is used as the basic unit of systems analysis
and design.
B. an object is a collection of data that is acted on by
external processes.
C. processing logic resides within objects.
D. a strict, step-by-step development process is
essential.
C
B. prototyping.
C. object-oriented development.
D. the systems development lifecycle.
D
54) In the traditional systems development lifecycle, end
users:
A. are important and ongoing members of the team
from the original analysis phase through maintenance.
B. are important only in the testing phases.
C. have no input.
D. are limited to providing information requirements and
reviewing the technical staff's work.
D
55) In which type of systems building are the
development stages organized so that tasks in one stage
are completed before the tasks in the next stage begun?
A. traditional
B. prototyping
C. RAD
D. All of the above
A
56) As a technical project manager you have decided to
propose implementing a prototyping methodology for a
small Web-based design project. What is the order of
steps you will follow in this project?
A. Develop the prototype; use the prototype; revise and
enhance the prototype.
B. Identify user requirements, develop the prototype, use
the prototype, revise and enhance the prototype.
C. Define the requirements, develop solutions, select the
best prototype, and implement the prototype.
D. Define the requirements, develop the prototype,
revise and enhance the prototype.
B
57) A systems building approach in which the system is
developed as successive versions, each version
B) database
C) manual procedures
D) conversion
D
36) Which of the following is not an example of fourth
generation development tools?
A) Microsoft Excel
B) graphics software, such as Photoshop
C) report generator
D) very high-level programming language
B
37) The entire system-building effort is driven by
A) organizational change.
B) feasibility studies.
C) the information value chain.
D) user information requirements.
D
38) Unit testing
A) includes all the preparations for the series of tests to
be performed on the system.
B) tests the functioning of the system as a whole in
order to determine if discrete modules will function
together as planned.
C) tests each program separately.
D) provides the final certification that the system is
ready to be used in a production setting.
C
39) System testing
A) includes all the preparations for the series of tests to
be performed on the system.
B) tests the functioning of the system as a whole in
order to determine if discrete modules will function
together as planned.
C) tests each program separately.
D) provides the final certification that the system is
ready to be used in a production setting.
B
40) Acceptance testing
A) includes all the preparations for the series of tests to
be performed on the system.
B) tests the functioning of the system as a whole in
order to determine if discrete modules will function
together as planned.
C) tests each program separately.
D) provides the final certification that the system is
ready to be used in a production setting.
D
41) In a parallel conversion strategy, the new system
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.
C
42) In the direct cutover conversion strategy, the new
system
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.
B
43) Changes in hardware, software, documentation, or
production to a production system to correct errors,
meet new requirements, or improve processing
efficiencies are termed
A) compliance.
B) production.
C) maintenance.
D) acceptance.
C
44) In what stage of systems development are design
specifications created?
A) systems analysis
B) systems design
C) testing
D) conversion
B
45) The primary tool for representing a system's
component processes and the flow of data between
them is the
A) data dictionary.
B) process specifications diagram.
C) user documentation.
D) data flow diagram.
D
46) An entire information system is broken down into its
subsystems by using
A) high-level data flow diagrams.
B) low-level data flow diagrams.
C) process specifications.
D) structured diagrams.
A
47) To understand and define the contents of data flows
and data store, system builders use
A) a data dictionary.
B) process specifications diagrams.
C) user documentation.
D) data flow diagrams.
A
48) To show each level of a system's design, its
relationship to other levels, and its place in the overall
design structure, structured methodologies use
A) structure charts.
B) Gantt and PERT charts.
C) process specifications.
D) data flow diagrams.
A
Systems design:
shows how the new system will fulfill the information
requirements.
System design specifications that address the category
of database design issues will include specifications for:
transaction volume and speed requirements.
Transferring data from a legacy system to the new
system would be defined by which category of system
design specifications?
conversion
Determining methods for feedback and error handling
would be defined by which category of system design
specifications?
user interface
Unit testing:
tests each program separately.
System testing:
tests the functioning of the system as a whole in order to
determine if discrete modules will function together as
planned.
Acceptance testing:
provides the final certification that the system is ready to
be used in a production setting.
In a parallel conversion strategy, the new system:
and the old are run together.
In the direct cutover conversion strategy, the new
system:
replaces the old one at an appointed time.
Changes in hardware, software, documentation, or
production to a production system to correct errors,
Answer: A
22) The four kinds of structural organizational change enabled by IT, in order from least to
most risky, are
A) rationalization, automation, reengineering, and redesigning.
B) rationalization, automation, reengineering, and paradigm shift.
C) automation, rationalization, reengineering, and paradigm shift.
D) automation, redesigning, restructuring, and paradigm shift.
Answer: C
23) Business processes are analyzed, simplified, and redesigned in
A) business process redesign.
B) rationalization of procedures.
C) automation.
D) paradigm shifts.
Answer: A
24) In automation
A) business processes are simplified.
B) business processes are reorganized to cut waste and eliminate repetitive, paper-intensive
tasks.
C) standard operating procedures are streamlined to remove bottlenecks.
D) employees are enabled to perform their tasks more efficiently.
Answer: D
25) A bank has reworked its mortgage application process so that several steps are handled
by computer software, and some steps are combined to reduce bottlenecks in processing.
The goal is to gradually improve its efficiency over time. This is an example of
A) automation.
B) rationalization of procedures.
C) paradigm shift.
D) business process redesign.
Answer: B
26) An upscale organic foods grocery chain is implementing an information system that will
enable it to add same-day home delivery of groceries to its customers. This is an example of
A) automation.
B) rationalization of procedures.
C) paradigm shift.
D) business process redesign.
Answer: C
27) In order, what are the first three steps in BPM?
A) (1) identifying processes for change, (2) analyzing existing processes, (3) designing the
new process
B) (1) analyzing existing processes, (2) identifying processes for change, (3) designing the
new process
C) (1) identifying processes for change, (2) designing the new process, (3) implementing the
new process
D) (1) analyzing processes to change (2) designing the new process, (3) measuring the
optimized process
Answer: A
28) ________ provide(s) a methodology and tools for dealing with the organization's ongoing
need to revise and optimize its numerous business processes.
A) Business process redesign
B) Business process management
C) CASE tools
D) TQM
Answer: B
29) The idea that the achievement of quality control is an end in itself describes a main
concept of
A) BPM.
B) BPR.
C) six sigma.
D) TQM.
Answer: D
30) Which process develops a detailed description of the functions that a new information
system must perform?
A) feasibility study
B) requirements analysis
C) systems design
D) test plan development
Answer: B
33) System design specifications that address the category of database design issues will
include specifications for
A) transaction volume and speed requirements.
B) data entry.
C) job design.
D) program logic and computations.
Answer: A
34) Enabling organizations to make continual improvements to many business processes
and to use processes as the fundamental building blocks of corporate information systems is
the goal of
35) Transferring data from a legacy system to the new system would be defined by which
category of system design specifications?
A) input
B) database
C) manual procedures
D) conversion
Answer: D
36) Determining methods for feedback and error handling would be defined by which
category of system design specifications?
A) training and documentation
B) user interface
C) manual procedures
D) security and controls
Answer: B
B) tests the functioning of the system as a whole in order to determine if discrete modules
will function together as planned.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.
Answer: B
39) Acceptance testing
A) includes all the preparations for the series of tests to be performed on the system.
B) tests the functioning of the system as a whole in order to determine if discrete modules
will function together as planned.
C) tests each program separately.
D) provides the final certification that the system is ready to be used in a production setting.
Answer: D
40) In a parallel conversion strategy, the new system
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.
Answer: C
41) In the direct cutover conversion strategy, the new system
A) is tested by an outsourced company.
B) replaces the old one at an appointed time.
C) and the old are run together.
D) is introduced in stages.
Answer: B
42) Changes in hardware, software, documentation, or production to a production system to
correct errors, meet new requirements, or improve processing efficiencies are termed
A) compliance.
B) production.
C) maintenance.
D) acceptance.
Answer: C
43) In what stage of systems development are design specifications created?
A) systems analysis
B) systems design
C) testing
D) conversion
Answer: B
44) The primary tool for representing a system's component processes and the flow of data
between them is the
A) data dictionary.
B) process specifications diagram.
C) user documentation.
D) data flow diagram.
Answer: D
45) To understand and define the contents of data flows and data store, system builders use
A) a data dictionary.
B) process specifications diagrams.
C) user documentation.
D) data flow diagrams.
Answer: A
46) To show each level of a system's design, its relationship to other levels, and its place in
the overall design structure, structured methodologies use
A) structure charts.
B) Gantt and PERT charts.
C) process specifications.
D) data flow diagrams.
Answer: A
47) An entire information system is broken down into its subsystems by using
A) high-level data flow diagrams.
51) Object-oriented development could potentially reduce the time and cost of writing
software because
A) object-oriented programming requires less training.
B) iterative prototyping is not required.
C) objects are reusable.
D) a single user interface object can be used for the entire application.
Answer: C
55) In which type of systems building are the development stages organized so that tasks in
one stage are completed before the tasks in the next stage begun?
A) traditional
B) prototyping
C) RAD
D) all of the above
Answer: A
56) As a technical project manager you have decided to propose implementing a prototyping
methodology for a small Web-based design project. What is the order of steps you will follow
in this project?
A) Develop the prototype; use the prototype; revise and enhance the prototype.
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance
the prototype.
C) Define the requirements, develop solutions, select the best prototype, and implement the
prototype.
D) Define the requirements, develop the prototype, revise and enhance the prototype.
Answer: B
57) A systems building approach in which the system is developed as successive versions,
each version reflecting requirements more accurately, is described to be
A) end-user oriented.
B) iterative.
C) object-oriented.
D) agile.
Answer: B
58) Which type of fourth-generation language tools are end-users most likely to work with?
A) report generators and query languages
B) report generators and application generators
C) PC software tools and query languages
D) PC software tools and report generators
Answer: C
59) Which type of fourth-generation language tool contains preprogrammed modules that
can be used to create entire applications?
A) PC software tools
B) report generators
C) application generators
D) application software packages
Answer: C
60) When systems are created rapidly, without a formal development methodology
A) end users can take over the work of IT specialists.
B) the organization quickly outgrows the new system.
C) hardware, software, and quality standards are less important.
D) testing and documentation may be inadequate.
Answer: D
62) Fourth-generation tools cannot replace conventional development tools because they
A) cannot handle large numbers of transactions or extensive procedural logic.
B) are not designed to integrate with legacy systems.
C) do not incorporate methods for documentation.
D) do not incorporate methods for testing.
Answer: A
63) Categories of tools for BPM include all of the following except
A) tools to integrate existing systems to support business processes improvements.
B) tools to automate business processes.
C) tools to identify and document business processes.
D) tools to test the security of business processes.
Answer: D
65) The process of creating workable information systems in a very short period of time is
called
A) RAD.
B) JAD.
C) prototyping.
D) B and C.
Answer: A
67) You are an IT project manager for an advertising firm. The firm wishes to create an
online tool that will be used to survey focus group reactions to products in development. The
most important consideration for the firm is being able to offer the tool as soon as possible
as a new corporate service. However, you know that many of the senior managers that are
business owners of this project have difficulty in understanding technical or software
development issues, and are likely to change their requirements during the course of
development. What development method would be most successful for this project?
A) RAD
B) JAD
C) end-user development
D) prototyping
Answer: D
68) Groups of objects are assembled into software components for common functions, which
can be combined into large-scale business applications, in which type of software
development?
A) object-oriented development
B) component-based development
C) structured methodologies
D) RAD
Answer: B
69) Compared to the use of proprietary components, Web services promise to be less
expensive and less difficult to implement because of
A) their ability to integrate seamlessly with legacy systems.
B) the use of universal standards.
C) the ubiquity of the Internet.
D) the ability to reuse Web services components.
Answer: B
72) A software package evaluation process is often based on a series of questions sent to
vendors, called a(n) ________.
73) During the ________ stage of system development, system specifications that were
prepared during the design stage are translated into software code.
Answer: programming
74) A systems analysis includes a(n) ________ that is used to determine whether the
solution is achievable from a financial, technical, and organizational standpoint.
Answer: feasibility study
75) ________ contain a detailed statement of the information needs that a new system must
satisfy; identifies who needs what information, and when, where, and how the information is
needed.
Answer: Information requirements
76) A(n) ________ is the model or blueprint for an information system solution and consists
of all the specifications that will deliver the functions identified during systems analysis.
Answer: systems design
77) ________ is the process of changing from the old system to the new system.
Answer: Conversion
78) ________ describe the transformation occurring within the lowest level of the data flow
diagrams.
Answer: Process specifications
79) ________ are software tools that enable end users to create reports or develop software
applications with minimal or no technical assistance.
Answer: Fourth-generation languages
80) ________ design is a process used to accelerate the generation of information
requirements by having end-users and information system specialists work together in
intensive interactive design sessions.
Answer: Joint application
Chap 10
21) Neural network applications in medicine, science, and business address problems in all of
the following except:
A) pattern classification.
B) prediction.
C) control and optimization.
D) generalization.
Answer: D
C) Structured
D) Undocumented
Answer: B
29) Operational management typically makes which type of decisions?
A) Semistructured
B) Documented
C) Structured
D) Procedural
Answer: C
30) Deciding whether to introduce a new product line is an example of a(n):
A) unstructured decision.
B) semistructured decision.
C) procedural decision.
D) nonprocedural decision.
Answer: A
31) Estimating the number of direct goods to reorder falls into which category of decisionmaking?
A) Structured
B) Documented
C) Unstructured
D) Procedural
Answer: A
32) Which phase of decision making finds or recognizes a problem?
A) Design
B) Intelligence
C) Choice
D) Implementation
Answer: B
33) Simon's four different stages in decision making are, in order from first to last:
A) identification, choice, design, and implementation.
B) identification, design, choice, and finalization.
C) intelligence, choice, design, and implementation.
D) intelligence, design, choice, and implementation.
Answer: D
34) Which dimension of quality means that a decision should reflect a rational process?
A) Comprehensiveness
B) Accuracy
C) Fairness
D) Coherence
Answer: D
35) Which dimension of quality means that a decision faithfully reflects the concerns and
interests of affected parties?
A) Due process
B) Justice
C) Fairness
D) Coherence
Answer: C
36) Which dimension of quality means that a decision is the result of a known process and
can be appealed to a higher authority?
A) Due process
B) Justice
C) Fairness
D) Accuracy
Answer: A
37) MIS typically produce:
A) New ways of looking at data that emphasize change, flexibility, and rapid response.
B) Fixed, regularly scheduled reports based on data extracted from the organization's TPS.
C) Solutions to semistructured problems appropriate for middle management decisionmaking.
D) Responses to ad hoc queries, and graphic representations of existing data.
Answer: B
38) Which systems help managers monitor and control the business by providing information
on the firm's performance?
A) MIS
B) DSS
C) ESS
D) GDSS
Answer: A
39) Which systems support decision-making by enabling users to extract useful information
that was previously buried in large quantities of data?
A) GSS
B) ESS
C) TPS
D) DSS
Answer: D
40) The components of a DSS are the:
A) database, data query language, and user interface.
B) data visualization tools, software, and graphics capabilities.
C) database, data mining tools, and analysis tools.
D) user interface, software system, and database.
Answer: D
42) Which type of model is used to help managers estimate future conditions and sales
figures resulting from these conditions?
A) Forecasting
B) Predictive
C) Statistical
D) Sensitivity analysis
Answer: A
43) Optimization models are often used to:
A) project future conditions and predict the effect of these conditions on sales.
B) determine the proper mix of products within a given market to maximize profits.
C) determine the price of a product given fluctuating sales and advertising budget.
D) establish the best relationship between price and sales and marketing budgets.
Answer: B
44) What type of model asks what-if questions repeatedly to determine the impact on
outcomes of changes in one or more factors?
A) Optimization
B) Sensitivity analysis
C) Goal seeking
D) Forecasting
Answer: B
45) Backward sensitivity analysis software is used for:
A) supply chain optimization.
B) historical what-if analysis.
C) goal seeking.
D) reverse forecasting.
Answer: C
46) Which type of information system uses data visualization technology to analyze and
display data for planning and decision making in the form of digitized maps?
A) GIS
B) DSS
C) GSS
D) TPS
Answer: A
47) GDSS are designed to:
A) allow meeting attendees to share their thoughts in real-time with their peers.
B) manage knowledge using a global perspective.
C) enable collaboration among geographically dispersed participants.
D) implement structured methods for organizing and evaluation ideas.
Answer: D
48) Automobile companies would implement a(n) ________ to allow Web site visitors to
configure their desired car.
A) customer decision support (CDSS)
B) model-driven DSS
C) CAD system
D) GDSS
Answer: A
A) Knowledge-based systems.
B) Neural networks.
C) Fuzzy logic systems.
D) Expert systems.
Answer: B
56) Intelligent techniques that parallel some aspects of the processing patterns of the
biological brain best describes:
A) neural networks.
B) genetic algorithms.
C) case-based reasoning.
D) fuzzy logic.
Answer: A
59) Expertise and experience of organizational members that has not been formally
documented best describes:
A) wisdom.
B) information.
C) data.
D) tacit knowledge.
Answer: D
60) What are the two major types of knowledge management systems?
A) Management information systems and decision support systems
B) Enterprise-wide knowledge management systems and knowledge work systems
C) Enterprise systems and knowledge management systems
D) Expert systems and knowledge work systems
Answer: B
61) ________ systems help organizations manage both structured and semistructured
knowledge.
A) Digital asset management
B) Knowledge network
68) Virtual reality applications for the Web use a standard called:
A) CAD
B) VRML
C) VML
D) TCP/IP
Answer: B
69) Virtual reality systems:
A) provide design engineers with precise, three-dimensional representations of their models.
B) provide an important source of expertise for organizations.
C) allow groups to work together on documents.
D) provide simulations of walking through or manipulating a three-dimensional model or
programmed real-world environment.
Answer: D
70) Based on your reading of the chapter case discussing the HSBC, which type of
information system was used to establish the policies for lending subprime mortgages?
A) Data-driven DSS
B) Model-driven DSS
C) Model-driven ESS
D) GIS
Answer: B
71) A(n) ________ is an abstract representation illustrating the components or relationships
of a phenomenon.
Answer: model
72) ________ helps users see patterns and relationships in large amounts of data by
presenting the data in graphical form.
Answer: Data visualization
73) A(n) ________ is a table that displays two or more dimensions of data in a convenient
format.
Answer: pivot table
74) ________ use easy-to-understand displays to provide management with a comprehensive
view of firm performance on a single screen.
Answer: Digital dashboards
75) ESS have are able to ________, or move from summary data to lower and lower levels of
detail.
Answer: drill down
76) ________ technology consists of computer-based systems that attempt to emulate human
behavior and thought patterns.
Answer: Artificial intelligence/AI
77) Decision making is enhanced by a diverse group of ________ techniques, such as data
mining, expert systems, neural networks, fuzzy logic, genetic algorithms, and intelligent
agents.
Answer: intelligent
d
Neural network applications in medicine, science, and
business address problems in all of the following except:
A) pattern classification.
B) prediction.
C) control and optimization.
D) generalization
a
Which of the following is a key problem in managing
knowledge?
A) Classifying knowledge
B) Storing knowledge
C) Distributing knowledge
D) Locating knowledge
a
According to your reading of the text, Procter & Gamble's
use of intelligent agent technology in its supply chain
illustrates the use of information systems to implement
which of the four generic business strategies
A) Low-cost leadership
B) Product differentiation
C) Focus on market niche
D) Strengthen customer and supplier intimacy
c
Why does improving a small, routine decision have
business value for a company?
A) A small decision may have a great economic impact on
the company.
B) Even a routine decision may have a "ripple" effect
through a corporation.
C) A small decision has business value when added with
all the other small decisions made in the company.
D) Small, routine decisions typically do not have any
business value for a company
b
Where there is no well-understood or agreed-on
procedure for making a decision, it is said to be:
A) undocumented.
B) unstructured.
C) documented.
D) semistructured
a
The type of decision that can be made by following a
definite procedure is called a(n) ________ decision.
A) structured
B) unstructured
C) semistructured
D) procedural
c
Which types of decisions are more prevalent at lower
organizational levels?
A) Procedural decisions
B) Unstructured decisions
C) Structured decisions
D) Semistructured decisions
b
________ decisions are most common at higher levels of
management.
A) Semistructured
B) Unstructured
C) Structured
D) Undocumented
c
Operational management typically makes which type of
decisions?
A) Semistructured
B) Documented
C) Structured
D) Procedural
a
Deciding whether to introduce a new product line is an
example of a(n):
A) unstructured decision.
B) semistructured decision.
C) procedural decision.
D) nonprocedural decision
a
Estimating the number of direct goods to reorder falls into
which category of decision making?
A) Structured
B) Documented
C) Unstructured
D) Procedural
b
Which phase of decision making finds or recognizes a
problem?
A) Design
B) Intelligence
C) Choice
D) Implementation
d
Simon's four different stages in decision making are, in
order from first to last:
A) identification, choice, design, and implementation.
B) identification, design, choice, and finalization.
C) intelligence, choice, design, and implementation.
D) intelligence, design, choice, and implementation
d
Which dimension of quality means that a decision should
reflect a rational process?
A) Comprehensiveness
B) Accuracy
C) Fairness
D) Coherence
c
Which dimension of quality means that a decision
faithfully reflects the concerns and interests of affected
parties?
A) Due process
B) Justice
C) Fairness
D) Coherence
a
You are answering phones for a local utilities provider and
are speaking with an extremely angry customer. Because
your company manual advises employees to transfer
hostile calls to a superior, you do this. What quality
dimension of decisions does your action reflect?
A) Due process
B) Justice
C) Fairness
D) Accuracy
b
Which of the following is not an element of the business
intelligence environment?
A) User interface
B) Executive users
C) Platform
D) Business analytics toolset
a
All of the following are analytic functionalities that BI
systems deliver except:
A) user interface.
B) ad hoc queries.
C) dashboards.
D) production reports
d
Which of the following would be a typical production
report for an organization's financial division?
A) Variability of sales by region and time
B) Projected income
C) Supplier information
D) Cash flow
d
In a parameterized report, users can:
A) drill down to more finely grained information.
B) create their own reports based on custom queries.
C) view overall firm performance data.
D) view data according to different dimensions of the data
b
Which of the following BI functionalities would you use to
assess how customers would respond to a price change in
your product?
A) Paramaterized reports
B) Predictive analytics
C) Ad hoc queries
D) Production reports
a
All of the following are dimensions of firm performance
that are measured in the balanced scorecard method
except:
A) resources.
B) business process.
C) customer.
D) learning and growth
b
Why is the balanced scorecard method said to be
"balanced"?
a
Expert systems model human knowledge as a set of rules
that collectively are called the:
A) knowledge base.
B) knowledge database.
C) inference engine.
D) inference base
d
An inference engine is:
A) a data mining strategy used by intelligent agents.
B) the programming environment of an expert system.
C) a method of organizing expert system knowledge into
chunks.
D) a strategy used to search through the rule base in an
expert system.
b
Virtually all successful expert systems deal with problems
of:
A) associative data.
B) classification.
C) logic and control.
D) unstructured decision-making
b
________ are designed to have a generalized capability to
learn.
A) Knowledge-based systems
B) Neural networks
C) Fuzzy logic systems
D) Expert systems
a
________ are intelligent techniques that parallel some
aspects of the processing patterns of the biological brain.
A) Neural networks
B) Genetic algorithms
C) CBR systems
D) Fuzzy logic systems
c
Genetic algorithms:
A) represent knowledge as groups of characteristics.
B) are software programs that work in the background to
carry out specific, repetitive tasks.
C) develop solutions to particular problems using
techniques such as mutation, crossover, and selection.
D) "learn" patterns from large quantities of data by sifting
through data
d
To automate routine tasks to help firms search for and
filter information for use in electronic commerce and
supply chain management, a firm would most likely use:
A) CAD systems.
B) genetic algorithms.
C) fuzzy logic systems.
D) intelligent agents.
d
Expertise and experience of organizational members that
has not been formally documented best describes:
A) wisdom.
B) information.
C) data.
D) tacit knowledge
b
What are the two major types of knowledge management
systems?
A) Management information systems and decision support
systems
B) Enterprise-wide knowledge management systems and
knowledge work systems
C) Enterprise systems and knowledge management
systems
D) Expert systems and knowledge work systems
c
________ systems help organizations manage both
structured and semistructured knowledge.
A) Digital asset management
B) Knowledge network
C) Enterprise content management
D) Knowledge work
a
In order to search for and retrieve knowledge objects in an
enterprise content management system, the objects
themselves must be:
A) tagged with a classification.
B) linked to their original sources.
C) organized into relevant directories.
D) referenced by appropriate indices
d
Tools for the management, delivery, tracking, and
assessment of various types of employee learning best
describes:
A) knowledge work systems.
B) employee relationship systems.
C) employee management systems.
D) learning management systems.
a
________ help media firms store and manage unstructured
digital data such as photographs, images, videos, and
audio files.
A) Digital asset management systems
B) Knowledge networks
C) LMS
D) CAD
d
________ are an essential component of a knowledge work
system.
A) Computer-aided design tools
Chapter 10
D. knowledge.
A
34) Which of the following are the three major types of
knowledge management systems?
A. management information systems, decision support
systems, and transaction processing systems
B. enterprise systems, customer support systems, and
supply chain management systems
C. database management systems, expert systems, and
knowledge work systems
D. enterprise-wide knowledge management systems,
knowledge work systems, and intelligent techniques
D
35) Specialized systems built for engineers, scientists,
and other knowledge workers charged with discovering
and creating new knowledge for a company are called
A. KWS.
B. LMS.
C. wikis.
D. CAD systems.
A
36) Fuzzy logic is a type of
A. data mining.
B. neural network.
C. intelligent technique.
D. business intelligence.
C
37) Which of the following is NOT a typical component
or capability of an enterprise-wide knowledge
management system?
A. collaboration tools
B. KWS
C. document management
D. LMS
B
C. AI technology.
D. genetic algorithms.
C
56) An inference engine is
A. a strategy for searching the rule base in case-based
reasoning.
B. the programming environment of an expert system.
C. a method of organizing expert system knowledge into
chunks.
D. a strategy used to search through the rule base in an
expert system by forward chaining or backward
chaining.
D
57) Forward chaining is
A. a strategy searching for the rule base in an expert
system that begins with information entered by the user.
B. the programming environment of an expert system.
C. a method of organizing expert system knowledge into
chunks.
D. a strategy for searching the rule base in an expert
system that begins with a hypothesis.
A
58) Backward chaining is
A. a strategy for searching the rule base in an expert
system that begins with information entered by the user.
B. the programming environment of an expert system.
C. a method of organizing expert system knowledge into
chunks.
D. a strategy for searching the rule base in an expert
system that begins with a hypothesis.
D
59) Expert systems
A. solve problems too difficult for human experts.
B. are based on DO WHILE rules.
C. work in very limited domains.
D. share characteristics with mainframe computing.
C
60) It is unlikely you could represent the knowledge in
the Encyclopedia Britannica with an expert system
because:
A. there is no one expert who understands all the
material contained within the encyclopedia.
B. the knowledge changes radically over a short time.
C. not all the knowledge in the encyclopedia can be
represented in the form of IF-THEN rules.
D. the knowledge is too general.
C
61) Virtually all expert systems deal with problems of
A. policy development.
B. classification.
C. logic and control.
D. high complexity.
B
62) Expert systems are expensive and time-consuming
to maintain because
A. their rule base is so complex.
B. they rely on equipment that becomes outdated.
C. their rules must be reprogrammed every time there is
a change in the environment, which in turn may change
the applicable rules.
D. only the person who created the system knows
exactly how it works, and may not be available when
changes are needed.
C
63) In this technique, descriptions of past experiences of
human specialists are stored in a database for later
retrieval when the user encounters a situation with
similar characteristics.
A. CBR
B. fuzzy logic
C. data mining
D. LMS
A
64) You are an automotive engineer working on an
application that will automatically parallel park a car.
The intelligent technique you may find most useful is:
A. case-based reasoning.
B. artificial intelligence.
C. fuzzy logic.
D. expert system.
C
65) Hardware and software that attempts to emulate the
processing patterns of the biological brain best
describes
A. a neural network.
B. an expert system.
C. case-based reasoning.
D. fuzzy logic.
A
66) Genetic algorithms
A. develop solutions to particular problems using
fitness, crossover, and mutation.
B. represent knowledge as groups of characteristics.
C. do not work for most problems.
D. are based on logic.
A
67) Which of the following describes a difference
between neural networks and genetic algorithms?
A. Genetic algorithms are designed to process large
amounts of information.
B. Genetic algorithms are a type of knowledge discovery,
while neural networks are an intelligent technique.
C. Neural networks are programmed to "learn."
D. All of the above
C
68) Software programs that work in the background
without direct human intervention to carry out specific,
Due process
37) Which of the following is not an element of the business
intelligence environment?
Executive users
38) All of the following are analytic functionalities that BI
systems deliver except:
User interface.
39) Which of the following would be a typical production report
for an organization's financial division?
Cash flow
40) In a parameterized report, users can:
View data according to different dimensions of the data.
41) Which of the following BI functionalities would you use to
assess how customers would respond to a price change in
your product?
Predictive analytics
42) All of the following are dimensions of firm performance that
are measured in the balanced scorecard method except:
Resources.
43) Why is the balanced scorecard method said to be
"balanced"?
It measures performance of more than just financial systems.
44) What type of model asks what-if questions repeatedly to
determine the impact on outcomes of changes in one or more
factors?
Sensitivity analysis
45) Backward sensitivity analysis software is used for:
Goal seeking.
46) Which type of information system uses data visualization
technology to analyze and display data for planning and
decision making in the form of digitized maps?
GIS
47) GDSS are designed to:
Implement structured methods for organizing and evaluation
ideas.
48) A KPI is:
A measure proposed by senior management.
49) You are the CEO of a national shoe store and want to add
three new stores. Which of the following tools will best help
you find the most potentially profitable new locations?
Intelligent agent
Chapter 9
________ tools.
- clickstream tracking
- customer tracking
- collaborative filtering
- filtering
collaborative filtering
Online marketplaces
- save users money and time by processing online sales
dealings.
- provide a digital environment where buyers and sellers
can establish prices for products.
- create revenue by providing digital content over the
Web.
- sell physical products directly to consumers or
individual businesses.
provide a digital environment where buyers and sellers
can establish prices for products.
- personalization/customization
- richness
- interactivity
richness
EDI is
- the use of Internet technologies for electronic data
transactions.
- the exchange between two organizations of standard
transactions through a network.
- electronic data invoicing.
- electronic delivery infrastructure.
the exchange between two organizations of standard
transactions through a network.
Which of the following is an ad that opens automatically
and does not disappear until the user clicks on it?
- pop-up ad
- controlled ad
- portal ad
- banner ad
pop-up ad
Which of the following is NOT one of the categories of
services that are popular for m-commerce?
- location-based services
- financial services
- games and entertainment
- e-books
e-books
Which of the following is NOT a recent development in
e-commerce?
- growth of wireless Internet connections
- online, interactive models for newspapers and other
traditional media
- use of blogs as a commercial medium
- transformation of the music recording industry
transformation of the music recording industry
globe.
B) the spread of plentiful, cheap information.
C) the enabling of commerce worldwide.
D) the availability of the Internet everywhere and
anytime.
D
26) Which of the following is not a recent development
in e-commerce?
A) Mobile e-commerce takes off.
B) Social networking sites become a new platform for ecommerce.
C) The music recording industry is disrupted as music
creation and distribution become decentralized.
D) Online entertainment business models surge.
C
27) Which of the following is not one of the unique
features of e-commerce technology?
A) information density
B) transparency
C) richness
D) social technology
B
28) Which feature of Internet technology has had the
most effect in the Internet's rapid spread across the
globe?
A) ubiquity
B) global reach
C) universal standards
D) social technology
C
29) The act of engaging consumers in a dialog that
dynamically adjusts the experience to the individual
describes which dimension of e-commerce technology?
A) ubiquity
B) personalization/customization
C) richness
D) interactivity
D
30) The integration of video, audio, and text marketing
messages into a single marketing message and
consumer experience describes which dimension of ecommerce technology?
A) ubiquity
B) personalization/customization
C) richness
D) interactivity
C
31) The lowered costs of information storage,
processing, and communication, along with the
improvement of data quality, has resulted in which
unique quality of e-commerce?
A) information density
B) richness
C) customization
D) interactivity
A
32) The effort required to locate a suitable product is
called
A) price discrimination.
B) search costs.
C) menu costs.
D) shopping costs.
B
33) Information density refers to the
A) richnesscomplexity and contentof a message.
B) total amount and quantity of information delivered to
consumers by merchants.
C) total amount and quantity of information available to
all market participants.
D) amount of information available to reduce price
transparency.
C
34) Selling the same goods to different targeted groups
at different prices is called
A) cost customization.
B) cost optimization.
C) price gouging.
D) price discrimination.
D
35) Information ________ exists when one party in a
transaction has more information that is important for
the transaction than the other party.
A) transparency
B) asymmetry
C) complexity
D) discrimination
B
36) Varying a product's price according to the supply
situation of the seller is called ________ pricing.
A) menu
B) flexible
C) dynamic
D) asymmetric
C
37) Reducing the business process layers in a
distribution channel is called
A) disintermediation.
B) BPR.
C) market segmentation.
D) network effects.
A
38) Digital goods are goods that are
A) produced digitally.
B) sold over digital networks.
C) delivered digitally.
D) used with digital equipment
C
39) Compared to digital markets, traditional markets
have
A) lower search costs.
B) stronger network effects.
C) higher delayed gratification effects.
D) higher transaction costs.
D
40) Compared to traditional goods, digital goods have
A) greater pricing flexibility.
B) lower marketing costs.
C) higher production costs.
D) higher inventory costs.
A
41) Compared to traditional markets, digital markets
have
A) lower distributed delivery costs.
B) higher marginal costs per unit.
C) equivalent copying costs.
D) similar inventory costs.
A
42) eBay is an example of
A) C2C e-commerce.
B) B2B e-commerce.
C) B2C e-commerce.
D) M-commerce.
A
43) Selling products and services directly to individual
consumers via the Internet best describes
A) B2B e-commerce.
B) C2C e-commerce.
C) M-commerce.
D) B2C e-commerce.
D
C) long-tail marketing.
D) crowdsourcing.
D
56) Exposing an individual to ads that are chosen and
based on the recorded and analyzed online behavior of
the individual is referred to as
A) clickstream advertising.
B) behavioral targeting.
C) online profiling.
D) long tail marketing.
B
57) Which of the following was the leading online
advertising format in 2012?
A) display ads
B) e-mail
C) classifieds
D) search engine
D
58) Which of the following statements about B2B
commerce is not true?
A) Eighty percent of online B2B e-commerce is still
based on EDI.
B) B2B e-commerce represents approximately threequarters of the overall B2B marketplace.
C) B2B e-commerce only includes commercial
transactions between firms.
D) B2B e-commerce revenues in 2012 were over $4
trillion.
B
59) EDI is
A) the use of Internet technologies for electronic data
transactions.
B) the exchange between two organizations of standard
transactions through a network.
C) electronic data invoicing.
D) electronic delivery infrastructure.
B
60) The process of sourcing goods and materials,
negotiating with suppliers, paying for goods, and
making delivery arrangements is called
A) e-procurement.
B) SCM.
C) procurement.
D) sourcing.
C
61) An extranet that links a large firm to its suppliers
and other key business partners is called a(n)
A) e-hub.
B) marketspace.
C) exchange.
D) private industrial network
D
62) E-hubs are more ________ than private industrial
networks.
A) transaction-oriented
B) collaborative
C) independent
D) supply-chain oriented
A
63) A mapping of a person's significant online, personal
relationships is called a social
A) Web.
B) graph.
C) community.
D) map.
B
64) A third-party Net marketplace that connects many
buyers and suppliers for spot purchasing is called a(n)
A) exchange.
B) vertical market.
C) private exchange.
D) e-hub.
A
65) Goods that are involved in the actual production
process are referred to as
A) raw materials.
B) direct goods.
C) purchasing goods.
D) indirect goods.
B
66) Which of the following statements about mcommerce is not true?
A) In 2012, m-commerce represented less than 10
percent of all e-commerce.
B) M-commerce is the fastest growing form of ecommerce.
C) M-commerce annual revenues are approximately $30
billion.
D) In 2012, the top-grossing category of m-commerce
was e-book sales.
D
67) You are building an e-commerce Web site that will
sell e-books and are looking for a hosted solution.
Which of the following functionalities is least important
for your business goals?
A) site tracking system
B) inventory management
C) digital catalog
D) customer database
B
68) You are planning the requirements for a site tracking
and reporting system for your company Web site. Which
of the following information requirements would not be
essential for this function?
A) number of unique visitors
B) pages visited
C) products purchased
D) secure credit card clearing
D
69) Which of the following is the least costly way to build
a Web site?
A) Outsource the Web site development to overseas
vendors.
B) Use a hosted solution and pre-built templates.
C) Build your site yourself from scratch using existing
software.
D) Use a site-building package.
B
70) You are advising an accounting firm that wants to
establish its first Web site. Approximately how much of
the Web site budget should you assign to purchasing
software?
A) 10 percent
B) 25 percent
C) 50 percent
D) none, as no software will need to be purchased
A
Chapter 9
21) Through what channel did e-commerce first evolve?
Online advertising sales
27) Which of the following is not one of the unique features of ecommerce technology?
Transparency
69) A new social mobile app you are developing allows users to
find friends who are logged in and within a 10-mile radius. This
would be categorized as a ________ service.
Geoinformational
70) Which of the following is not one of the platforms to be
considered in building a Web site presence?
Facebook platform
73) Content providers use ________ systems to process large
amounts of very small monetary transactions cost-effectively.
Micropayment
75) The Internet enables ________ marketing by leveraging the
fact that there is always some demand, however small, for a
product.
Long-tail
77) ________ is a peer-to-peer market in which participants bet
on the outcomes of current events, business, or social trends.
A prediction market
79) Which of the following is not one of the four main types of ecommerce presence?
Blogs
80) Geoadvertising sends ads to users based on their:
GPS locations.
Chapter 9
21) Through what channel did e-commerce first evolve?
A) Online advertising sales
B) Internet portals
C) Online book sales
D) Internet service providers
Answer: A
22) Based on your reading of the chapter, e-commerce is:
A) still in a revolutionary phase.
B) widely accepted by consumers, although technology is still quickly changing.
C) not yet fully accepted by consumers, although much of its driving technology is firmly in
place.
D) well entrenched as a form of modern commerce.
Answer: A
23) The quality of ubiquity, as it relates to e-commerce, is illustrated by:
A) the same set of standards being used across the globe.
B) the spread of plentiful, cheap information.
C) the enabling of commerce worldwide.
24) A marketplace extended beyond traditional boundaries and removed from a temporal and
geographic location is called a(n):
A) exchange.
B) marketspace.
C) online marketplace.
D) e-hub.
Answer: B
25) In which of the following Internet business models does a merchant create an online
digital environment that enables people with like interests to share information or buy and
sell goods?
A) Community provider
B) Service provider
C) Market creator
D) Transaction broker
Answer: A
26) Which of the following is not a recent development in e-commerce?
A) Wireless Internet connections grow rapidly.
B) Social networking sites become a new platform for e-commerce.
C) The music recording industry is disrupted as music creation and distribution become
decentralized.
D) Online entertainment business models surge.
Answer: C
27) How is the Internet and e-commerce causing severe disruption to the existing advertising
business model?
A) Ties between customer and businesses are being rethought.
B) Technology players such as Yahoo! seek to dominate online advertising and expand into
offline ad brokerage.
C) New methods of advertising, such as blog advertising, are emerging.
D) The market entry costs for online advertising services are extremely low.
Answer: B
28) Which of the following is not one of the unique features of e-commerce technology?
A) Information density
B) Transparency
C) Richness
D) Social technology
Answer: B
29) The act of engaging consumers in a dialog that dynamically adjusts the experience to the
individual describes which dimension of e-commerce technology?
A) Ubiquity
B) Personalization/customization
C) Richness
D) Interactivity
Answer: D
30) The integration of video, audio, and text marketing messages into a single marketing
message and consumer experience describes which dimension of e-commerce technology?
A) Ubiquity
B) Personalization/customization
C) Richness
D) Interactivity
Answer: C
31) The effort required to locate a suitable product is called:
A) price discrimination.
B) search costs.
C) menu costs.
D) shopping costs.
Answer: B
32) The lowered costs of information storage, processing, and communication, along with the
improvement of data quality, has resulted in which unique quality of e-commerce?
A) Information density
B) Richness
C) Customization
D) Interactivity
Answer: A
33) Information density refers to the:
A) richnesscomplexity and contentof a message.
B) total amount and quantity of information delivered to consumers by merchants.
C) total amount and quantity of information available to all market participants.
D) amount of information available to reduce price transparency.
Answer: C
34) Selling the same goods to different targeted groups at different prices is called:
A) cost customization.
B) cost optimization.
C) price gouging.
D) price discrimination.
Answer: D
35) Information ________ exists when one party in a transaction has more information that is
important for the transaction than the other party.
A) transparency
B) asymmetry
C) complexity
D) discrimination
Answer: B
36) The cost to a merchant of changing the price of a product is called a ________ cost.
A) pricing
B) dynamic pricing
C) menu
D) switching
Answer: C
37) Varying a product's price according to the supply situation of the seller is called
________ pricing.
A) menu
B) flexible
C) dynamic
D) asymmetric
Answer: C
38) Compared to digital markets, traditional markets have:
A) lower search costs.
B) stronger network effects.
C) higher delayed gratification effects.
D) higher transaction costs.
Answer: D
39) Reducing the business process layers in a distribution channel is called:
A) disintermediation.
B) BPR.
C) market segmentation.
D) network effects.
Answer: A
40) Digital goods are goods that are:
A) produced digitally.
B) sold over digital networks.
C) delivered digitally.
D) used with digital equipment.
Answer: C
41) Compared to traditional goods, digital goods have:
A) greater pricing flexibility.
B) lower marketing costs.
C) higher production costs.
D) higher inventory costs.
Answer: A
42) Compared to traditional markets, digital markets have:
A) lower distributed delivery costs.
B) higher marginal costs per unit.
C) equivalent copying costs.
D) similar inventory costs.
Answer: A
43) Which of the following Internet business models does Amazon.com use?
A) Content provider
B) Portal
C) Market creator
D) E-tailer
Answer: D
44) Which of the following businesses utilizes the content provider Internet business model?
A) Amazon.com
B) eBay.com
C) CNN.com
D) Motocross.com
Answer: C
45) Transaction brokers:
A) generate revenue from advertising or from directing buyers to sellers.
B) save users money and time by processing online sales transactions.
C) provide a digital environment where buyers and sellers can establish prices for products.
D) sell physical products directly to consumers or individual businesses.
Answer: B
46) Market creators:
A) save users money and time by processing online sales transactions.
B) provide a digital environment where buyers and sellers can establish prices for products.
C) create revenue by providing digital content over the Web.
D) sell physical products directly to consumers or individual businesses.
Answer: B
47) Which of the following best illustrates the sales revenue model?
A) EBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or
she makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
Answer: D
48) Which of the following best illustrates the affiliate revenue model?
A) EBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or
she makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
Answer: B
49) Which of the following best illustrates the transaction fee revenue model?
A) EBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or
she makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
Answer: A
50) In a phenomenon called ________, some argue that large numbers of people can make
better decisions about a wide range of topics or products than a single person or even a small
committee of experts
A) the wisdom of crowds
B) outsourcing
C) crowdsourcing
D) social networking
Answer: A
51) Netflix's public announcement of a reward for a technology solution to its movie
recommendation system is an example of:
A) prediction markets
B) behavioral targeting
C) long-tail marketing
D) crowdsourcing
Answer: D
52) EBay is an example of:
A) C2C e-commerce.
B) B2B e-commerce.
C) B2C e-commerce.
D) M-commerce.
Answer: A
53) Selling products and services directly to individual consumers via the Internet best
describes:
A) B2B e-commerce.
B) C2C e-commerce.
C) M-commerce.
D) B2C e-commerce.
Answer: D
54) Consumers selling goods and services electronically to other consumers best describes:
A) disintermediation.
B) C2C e-commerce.
C) M-commerce.
D) B2C e-commerce.
Answer: B
55) Exposing an individual to ads that are chosen and based on the recorded and analyzed
online behavior of the individual is referred to as:
A) clickstream advertising.
B) behavioral targeting.
C) online profiling.
D) long tail marketing.
Answer: B
56) Which of the following was the leading advertising format in 2009?
A) Display ads
B) E-mail
C) Classifieds
D) Search engine
Answer: D
57) Which of the following statements about B2B commerce is not true?
A) Eighty percent of online B2B e-commerce is still based on EDI.
B) B2B e-commerce represents approximately three-quarters of the overall B2B marketplace.
C) B2B e-commerce only includes commercial transactions between firms.
D) B2B e-commerce revenues in 2009 were over $3 trillion.
Answer: B
58) Goods that are involved in the actual production process are referred to as:
A) raw materials.
B) direct goods.
C) purchasing goods.
D) indirect goods.
Answer: B
60) The system functionalities of an e-commerce site are best described as the:
A) general capabilities wanted.
B) information systems capabilities wanted.
C) information elements needed.
D) software and hardware required.
Answer: B
61) EDI is:
A) the use of Internet technologies for electronic data transactions.
B) the exchange between two organizations of standard transactions through a network.
C) electronic data invoicing.
D) electronic delivery infrastructure.
Answer: B
62) The process of sourcing goods and materials, negotiating with suppliers, paying for
goods, and making delivery arrangements is called:
A) procurement.
B) e-procurement.
C) SCM.
D) sourcing.
Answer: A
63) An extranet that links a large firm to its suppliers and other key business partners is called
a(n):
A) e-hub.
B) marketspace.
C) exchange.
D) private industrial network.
Answer: D
67) Which of the following is not one of the categories of services that are popular for mcommerce?
A) location-based services
B) financial services.
C) games and entertainment.
D) retail shopping.
Answer: D
68) In the United States, m-commerce:
A) has become widely adopted.
B) is still in its infancy.
C) now represents a major fraction of total e-commerce transactions.
D) is growing slowly.
Answer: B
69) You are planning the requirements for a site tracking and reporting system for your
company Web site. Which of the following information requirements would not be essential
for this function?
A) Number of unique visitors
B) Pages visited
C) Products purchased
D) Secure credit card clearing
Answer: D
70) In which of the following revenue models does a Web site charge a fee for access to some
or all of its offerings on a continual, regular basis?
A) Subscription
B) Free/freemium
C) Transaction fee
D) Sales
Answer: A
71) Content providers use ________ systems to process large amounts of very small
monetary transactions cost-effectively.
Answer: micropayment
72) ________ refers to the ability of consumers to discover what merchants actually pay for
products.
Answer: Cost transparency
74) Online ________ marketing is like traditional word-of-mouth marketing except that it is
spread via online communities.
Answer: viral
75) The Internet enables ________ marketing, by leveraging the fact that there is always
some demand, however small, for a product.
Answer: long-tail
78) ________ goods, such as office supplies, are those not involved firsthand in the
production process.
Answer: Indirect
79) In Web server ________, a firm purchases or leases a Web server but locates the server in
a vendors physical facility.
Answer: co-location
80) Before building an e-commerce site, business objectives and functionalities must be
translated into a set of precise information ________.
Answer: requirements
Chap 11
21) What was the primary problem facing the Girl Scouts regarding their supply chain
problems?
A) Ordering process was inefficient for a large volume of orders
B) High error rates in ordering and fulfillment
C) Required too much time of volunteers
D) Paper-based system was outdated
Answer: A
22) Order the following steps in the systems development process in the correct sequence.
A) Systems analysis, systems design, hardware and software acquisition, testing, training
and documentation, conversion, production, and maintenance
B) Systems analysis, systems design, hardware and software acquisition, training and
documentation, conversion, testing, production, and maintenance
C) Systems analysis, systems design, hardware and software acquisition, testing, training
and documentation, production, conversion, and maintenance
D) Systems design, hardware and software acquisition, testing, training and documentation,
conversion, production, maintenance, and systems analysis
Answer: A
25) Developing an information system has been compared to the problem-solving process.
Which one of the following problem-solving steps is not a part of systems analysis?
A) Implement the solution
28) Determining methods for feedback and error handling would be defined by which system
design specification category?
A) Training and documentation
B) User interface
C) Manual procedures
D) Security and controls
Answer: B
29) Transferring transaction data from a legacy system to the new system would be defined
by which system design specification category?
A) Input
B) Database
C) Manual procedures
D) Conversion
Answer: D
30) System design specifications that address database issues will include specifications for:
A) volume and speed requirements.
B) data entry.
C) input, processing, and output controls.
D) program logic and computations.
Answer: A
31) System design specifications that address input issues will include specifications for:
A) training modules and platforms.
B) flow and data entry.
C) input, processing, and output controls.
D) medium and content.
Answer: B
37) The Girl Scouts' conversion strategy of first introducing the modules for ordering cookies
and then introducing the modules for transmitting orders and instructions to the cookie
factory and shipper is called a(n) ________ strategy.
A) phased approach
B) direct cutover
C) indirect cutover
D) incremental conversion
Answer: A
38) Changes in hardware, software, documentation, or production to a production system to
correct errors, meet new requirements, or improve processing efficiencies are termed:
A) compliance.
B) production.
C) maintenance.
D) acceptance.
Answer: C
39) The oldest method for building information systems is:
A) component-based development.
B) prototyping.
C) object-oriented development.
D) the systems development lifecycle.
Answer: D
40) In the traditional systems development lifecycle, end users:
A) are important and ongoing members of the team from the original analysis phase through
maintenance.
B) are important only in the testing phases.
C) have no input.
D) are limited to providing information requirements and reviewing the technical staff's work.
Answer: D
41) As a technical project manager you have decided to propose implementing a prototyping
methodology for a small Web-based design project. What is the order of steps you will follow
in this project?
A) Develop the prototype; use the prototype; revise and enhance the prototype
B) Identify user requirements, develop the prototype, use the prototype, revise and enhance
the prototype
C) Define the requirements, develop solutions, select the best prototype, and implement the
prototype
D) Define the requirements, develop the prototype, revise and enhance the prototype
Answer: B
42) When systems are created rapidly, without a formal development methodology:
A) end users can take over the work of IT specialists.
B) the organization quickly outgrows the new system.
C) hardware, software, and quality standards are less important.
D) testing and documentation may be inadequate.
Answer: D
43) Fourth-generation tools cannot replace conventional development tools because they:
A) cannot handle large numbers of transactions or extensive procedural logic.
B) are not designed to integrate with legacy systems.
C) do not incorporate methods for documentation.
D) do not incorporate methods for testing.
Answer: A
44) Management can control the development of end-user applications in part by:
A) developing a formal development methodology.
B) requiring cost justification for end-user IS projects.
C) establishing standards for project requirements.
D) requiring Gantt charts
Answer: C
45) If an organization's requirements conflict with the software package chosen and the
package cannot be customized, the organization will have to:
A) change its procedures.
B) outsource the development of the system.
C) redesign the RFP.
D) change the evaluation process.
Answer: A
46) "Hidden costs" such as ________ costs can easily undercut anticipated benefits from
outsourcing.
A) vendor selection
B) hardware
C) software
D) employee salary
Answer: A
47) The process of creating workable information systems in a very short period of time is
called:
A) RAD.
B) JAD.
C) prototyping.
D) end-user development.
Answer: A
48) This type of systems development is characterized by significantly speeding up the
design phase and the generation of information requirements and involving users at an
intense level.
A) RAD
B) JAD
C) Prototyping
D) End-user development
Answer: B
49) The term structured, when discussing structured methodologies, refers to the fact that:
A) the finished software is highly documented.
B) the development process is highly documented.
C) the techniques are step by step, with each step building on the previous one.
D) a defined hierarchy of objects and classes are used to structure the programming.
Answer: C
50) The primary tool for representing a system's component processes and the flow of data
between them is the:
A) data dictionary.
B) process specifications diagram.
C) user documentation.
D) data flow diagram.
Answer: D
51) You are an IT project manager for an advertising firm. The firm wishes to create an
online survey tool that will be used to survey focus group reactions to products in
development. The most important consideration for the firm is being able to offer the tool as
soon as possible as a new corporate service. However, you know that many of the senior
managers that are business owners of this project have difficulty in understanding technical
or software development issues, and are likely to change their requirements during the
course of development. What development method would be most successful for this
project?
A) RAD
B) JAD
C) End-user development
D) Prototyping
Answer: D
52) To show each level of a system's design, its relationship to other levels, and its place in
the overall design structure, structured methodologies use:
A) structure charts.
C) JAD
D) RAD
Answer: A
60) ________ refers to the application of knowledge, skills, tools, and techniques to achieve
specific targets within specified budget and time constraints.
A) Systems analysis
B) Systems design
C) Project management
D) Project implementation
Answer: C
61) The worth of systems from a financial perspective essentially revolves around the
question of:
A) systems ownership.
B) information requirements.
C) multiyear financial models.
D) return on invested capital.
Answer: D
62) ________ are tangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information
Answer: B
63) ________ are intangible benefits of information systems.
A) Improved asset utilization, increased organizational learning, and improved operations
B) Reduced workforce, lower outside vendor costs, and increased productivity
C) Increased productivity, reduced workforce, and increased job satisfaction
D) Lower operational costs, improved resource control, and more information
Answer: A
64) Which process is used to develop risk profiles for a firm's information system projects
and assets?
A) Information systems plan
B) Scoring model
C) Portfolio analysis
D) Feasibility study
Answer: C
65) You have been hired by a pharmaceutical company to evaluate its portfolio of systems
and IT projects. Which types of projects would be best avoided?
A) Any high risk projects
B) Any low-benefit projects
C) High-risk, low benefit projects
D) None any project might be beneficial
Answer: C
66) A business document indicating the direction of systems development, the rationale, the
current systems, new developments to consider, the management strategy, the
implementation plan, and the budget is called a(n):
A) project plan.
67) The project risk will rise if the project team and the IS staff lack:
A) RAD experience.
B) web services.
C) the required technical expertise.
D) CASE tools.
Answer: C
68) Users prefer systems that:
A) are oriented to facilitating organizational tasks and solving business problems.
B) work with existing DBMS.
C) are able to provide optimum hardware and software efficiency.
D) are capable of storing much more data than they need.
Answer: A
69) A ________ shows each task as a horizontal bar whose length is proportional to the time
required to complete it.
A) PERT chart
B) DFD
C) feasibility study
D) Gantt chart
Answer: D
70) Which of the following tools may help identify risk areas associated with employee
acceptance of a new information system?
A) Formal planning and control tools
B) Organizational impact analysis
C) System prototype
D) Feasibility study
Answer: B
71) A systems analysis includes a(n) ________ study that is used to determine whether the
solution is achievable, from a financial, technical, and organizational standpoint.
Answer: feasibility
72) A(n) ________ includes all the preparations for the series of tests to be performed on the
system.
Answer: test plan
73) ________ is the process of changing from the old system to the new system.
Answer: Conversion
74) A(n) ________ is the preliminary working version of an information system.
Answer: prototype
75) A(n) ________ is a detailed list of questions submitted to external vendors to determine
how well they meet the organization's specific requirements.
Answer: Request for Proposal/RFP
76) ________ is the modification of a software package to meet the organization's unique
requirements without destroying the package software's integrity.
Answer: Customization
77) ________ describe the transformation occurring within the lowest level of the data flow
diagrams. They express the logic of each process.
Answer: Process specifications
78) ________ benefits are those than can be quantified and assigned a monetary value.
Answer: Tangible
79) A(n) ________ is a method for deciding among alternative systems based on a system
of ratings for selected objectives.
Answer: scoring model
80) ________ is the interaction of people and machines in the work environment, including
the design of jobs, health issues, and the end-user interface of information systems.
Answer: Ergonomics