Manakah dari pernyataan berikut tentang genetic algorithms yang tidak benar?
b. digunakan untuk memecahkan masalah yang sangat dinamis dan kompleks, yang
melibatkan ratusan atau ribuan variabel atau rumus
Manakah dari pernyataan berikut tentang networked system yang tidak benar?
c. sistem di mana terdapat lingkungan global tunggal yang solid untuk pengembangan
dan sistem operasi
a. hanya orang yang membuat sistem yang tahu persis cara kerjanya, dan mungkin
sistem tidak tersedia saat diperlukan perubahan
c. aturan mereka harus diprogram ulang setiap kali ada perubahan lingkungan, yang
pada gilirannya dapat mengubah aturan yang telah berlaku
d. sulit untuk memprogram pada tingkat yang rumit tanpa memperkenalkan bug pada
perangkat lunak
Digital marketing yang ditunjang dengan CRM akan membantu manajemen
SAP mampu mengintegrasikan data pada perusahaan yang berbeda di 200 negara
dengan cara:
b.
c.
a.
c.
d.
Semua jawaban benar - kek e
Manakah dari berikut ini yang menjelaskan bagaimana kerangka kerja pengambilan
keputusan (Simon framework) bekerja di lingkungan keputusan yang high-velocity?
a.
Hanya langkah awal yang dilakukan oleh perangkat lunak; tiga langkah terakhir
ditangani oleh manusia
b.
Keempat langkah proses ditangani oleh algoritma perangkat lunak; manusia tersingkir
dari keputusan karena mereka terlalu lambat qz iki
c.
Tiga langkah pertama dari proses ditangani oleh algoritma perangkat lunak dan
langkah terakhir ditangani oleh manajer yang berpengalaman
d.
Manakah dari pernyataan berikut yang paling menggambarkan business value dari
pengambilan keputusan yang lebih baik?
a.
b.
Pengambilan keputusan yang lebih baik menghasilkan nilai moneter yang besar bagi
perusahaan karena banyak keputusan harian kecil yang mempengaruhi efisiensi, produksi,
biaya, dan lainnya yang secara tahunan dapat bernilai besar, qlet iki
c.
d.
Pengambilan keputusan yang lebih baik dapat menciptakan produk dan budaya
perusahaan yang lebih baik
Berikut adalah pernyataan yang benar terkait Group Decision Support Systems
(GDSS)
a.
a.
lebih
sistematis b.
lebih informal
c.
a.
aturan mereka harus diprogram ulang setiap kali ada perubahan lingkungan, yang pada
gilirannya dapat mengubah aturan yang telah berlaku
b.
hanya orang yang membuat sistem yang tahu persis cara kerjanya, dan mungkin sistem
tidak tersedia saat diperlukan perubahan
c.
sulit untuk memprogram pada tingkat yang rumit tanpa memperkenalkan bug pada
perangkat lunak
d.
basis aturan mereka sangat kompleks
Voice recognition solution mengirim order yang terintegrasi dengan SAP System
memungkinkan petugas gudang
a.
c.
As per an official report, voice integration in warehouses has reduced picking errors by
50%
Manakah dari berikut ini yang paling menggambarkan metode utama yang
digunakan dalam analisis portofolio
a.
b.
Melakukan inventarisasi semua proyek dan aset sistem informasi organisasi qlet c.
Menghitung skor sistem yang diusulkan pada sejumlah dimensi, dan memilih satu
dengan skor
tertinggi d.
Melakukan perbandingan dengan menghitung bobot dari kriteria yang digunakan
untuk mengevaluasi suatu sistem
Manakah dari jenis sistem berikut yang akan digunakan untuk memberikan informasi
mendalam kepada eksekutif pemasaran senior tentang retensi pelanggan, kepuasan, dan
kualitas kinerja ?
a.
CDS
S
b.
D
SS
c.
E
S
S
d
.
M
I
S
a.
lebih
sistematis b.
lebih terorganisir dengan baik
c.
lebih informal
a.
Terjadi karena pengguna dan spesialis sistem informasi cenderung memiliki latar
belakang, minat, dan prioritas yang berbeda
b.
Hal ini menciptakan risiko kegagalan yang sangat tinggi untuk proyek pengembangan
sistem
c.
Ini adalah salah satu alasan utama mengapa kebutuhan pengguna tidak dimasukkan
dengan benar ke dalam sistem informasi
d.
Spesialis sistem informasi lebih memilih sistem yang berorientasi pada pemecahan
masalah bisnis atau memfasilitasi tugas-tugas organisasi
a.
b.
cost-benefit analysis
c.
work-flow analysis
d.
feasibility analysis
Manakah dari pernyataan berikut yang paling menggambarkan pengaruh struktur proyek
terhadap risiko proyek secara keseluruhan?
a.
Proyek yang sangat terstruktur itu lebih kompleks, dan berisiko lebih tinggi bagi
pemrogram dan pengguna untuk mengalami kesalahpahaman tentang tujuan akhir
b.
Semakin tidak terstruktur suatu proyek, semakin besar kebebasan pengguna untuk
mendefinisikan sistem
c.
Proyek dengan tujuan yang relatif tidak terdefinisi lebih cenderung menjadi sasaran
perubahan persyaratan pengguna dan mendapatkan risiko yang lebih tinggi untuk tidak
terpenuhinya tujuan proyek
d.
Proyek yang kurang terstruktur dapat lebih cepat dikembangkan, diuji, dan
diimplementasikan menggunakan teknik pengembangan RAD dan JAD yang mutakhir,
dan menimbulkan risiko yang lebih kecil untuk pengeluaran biaya tak terduga
SCM pada Perusahaan Sari Roti dapat lebih effisien karena
a.
b.
c.
Penggunaan materai digital dapat membantu para pihak yang terikat dalam perjanjian
dengan cara
a.
Membuat Blockchain di antara para pihak dan tercatat pada database Kemenkumham
b.
d.
Anda memberi saran kepada perusahaan produksi video tentang jenis sistem
manajemen pengetahuan terbaik untuk membantu mereka mengarsipkan video
digital dan klip suara. Manakah dari berikut ini yang sesuai dengan kebutuhan
mereka?
a.
b.
CAD system
c.
MO
OC
d.
Manakah dari berikut ini yang paling menggambarkan metode utama yang digunakan
dalam scoring model?
a.
Menghitung return investasi untuk setiap sistem, dan memilih sistem dengan
return
terbaik b.
Melakukan inventarisasi semua proyek dan aset sistem informasi organisasi
c.
d.
Manakah dari pernyataan berikut tentang scoring model yang tidak benar The most
important outcome of a scoring model is the score. (yang terpenting adalah nilai
setiap investasi) Hasil yang paling penting dari scoring model adalah skor tiap
investasi
a.
Jenis teknik intelejen apa yang membantu Netflix mengembangkan pilihan video
yang dipersonalisasi untuk pelanggan?
Machine learning
Penjualan tiket Bis antar kota dapat terhubungkan dengan aplikasi Peduli Lindungi dan
mengurangi biaya test PCR ataupun antigen berulang ulang jika: a.Pemilik NIK adalah
pemakai devise dan terhubung dengan aplikasi online real time
a.
c.
Anda telah dipekerjakan untuk menerapkan sistem perusahaan yang akan melakukan
otomatisasi banyak pekerjaan di bidang penagihan dan akuntansi untuk perusahaan
layanan HVAC. Manakah dari berikut ini yang akan Anda persiapkan untuk
menggambarkan bagaimana sistem baru akan mempengaruhi struktur dan operasi
perusahaan?
a.
d.
a.
automati
on b.
perubahan paradigma
c.
rasionalisasi prosedur
d.
six sigma
Manakah dari jenis sistem berikut yang akan digunakan untuk memberikan informasi
mendalam kepada eksekutif pemasaran senior tentang retensi pelanggan, kepuasan, dan
kualitas kinerja ?
a.
ESS qz
b.
MIS tp d angkatan
iki c.
CDSS
d.
D
SS
Push
System b.
Pull System
c.
M
RP
d.
ERP System
a.
R
A
D
b.
J
A
D
c.
End-user development
d.
Prototyping brainly
Manakah dari berikut ini yang bukan salah satu masalah utama yang dihadapi perusahaan
yang ingin melakukan globalisasi?
a.
c.
Mengatur manajemen
sistem d.
Mendefinisikan lingkungan global
Manakah dari pernyataan berikut tentang proyek TI yang run away atau gagal yang
tidak benar?
a.
c.
Jenis sistem apa yang banyak digunakan oleh perusahaan manufaktur dan distribusi
untuk terhubung ke pemasok secara global?
a.
CR
M
b.
c.
M
I
S
d.
T
P
S
a.
b.
d.
a.
c.
a.
b.
d.
degree adalah superclass untuk Matematika dan Fisika
Anda memberi saran kepada perusahaan produksi video tentang jenis sistem
manajemen pengetahuan terbaik untuk membantu mereka mengarsipkan video
digital dan klip suara. Manakah dari berikut ini yang sesuai dengan kebutuhan
mereka?
a.
b.
MO
OC
c.
d.
CAD system
Toko bahan makanan organik kelas atas menerapkan sistem informasi yang
memungkinkannya menambahkan pengiriman bahan makanan ke rumah pada hari yang
sama kepada pelanggannya. Ini adalah contoh dari:
a.
rasionalisasi prosedur
b.
perubahan paradigma
c.
perubahan organisasi
d.
c.Pemilik NIK adalah pemakai devise dan terhubung dengan aplikasi online real time
d.
Pendapatan pemerintah dari PPn dapat meningkat tanpa terlalu memberatkan rakyat,
jika:
a.
Penjualan menggunakan digital money dan dikenakan PPn dalam prosentase kecil secara
langsung
b.
c.
Manakah dari berikut ini yang tidak benar tentang teknologi AI (Artificial
Intelligence)?
a.
Sistem AI mengambil data dari lingkungan, dan menghasilkan keluaran seperti program
komputer lainnya (paling yaaa)
b.
Program AI saat ini telah menguasai common sense thinking yang mirip dengan
manusia aku jwb ini krn blm, aku ini jg
c.
a.
J
A
D
b.
Prototypi
ng c.
RAD
d.
End-user development
a.
c.
Supplier adalah penyedia alat music Angklung , petani Bambu dan orang tua siswa (yg
paling masuk akal ini sih)
d.
a.
b.
Menghitung skor sistem yang diusulkan pada sejumlah dimensi, dan memilih satu dengan
skor tertinggi
c.
d.
Pada masa pandemic covid 19 jenis Omicron, penduduk yang sudah di vaksin dua kali
tidak perlu merasa takut tertular karena:
a.
c.
Program Peduli Lindungi mampu mencatat pergerakan tiap pemilik NIK (haruse ini tapi
aneh) di merdeka.com
d.
Program Peduli Lindungi yang dilengkapi aplikasi cookies mampu mengawasi pergerakan
pasien (cookies itu bukan buat melacak)
Pinjaman Online yang menjadi masalah bagi banyak peminjam karena tidak dapat
dikendalikan oleh OJK (Otoritas Jasa Keuangan) secara langsung disebabkan karena:
a.
d.
1. Supply chain planning system perform all the following functions except:
2.A firm in the finance industry should do which of the following to ensure that it
stays current with technology
3. Decision chooses from alternatives offer by important managers (iki opo mksde)
Nek mksde “Decisions are chosen from alternatives offered by important managers”
True(??)
Networked → p 607
9. As discussed in the chapter, which of the following is not one of the immediate
consequences of inadequate software project management?
11. Build business intelligent process through five stages : knowledge gathering, data
collection, perform data analysis process, data modelling with data mining algorithm and
extract data resume GATAU
True (?)
12. Covid 19 forces people to change their habits and work system to full automation,
rationalization happen in many offices, the systems must be redesigned and the most
difficult is paradigm shifts GATAU kayak true? Setuju true p496-497
13. Augmented reality help buyer to choose new apartment, MAYBE TRUE?
14.A bank has reworked its mortgage application process so that several steps are
handled by computer software, and some steps are combined to reduce bottleneck in
processing. The goal is to gradually improve its efficiency over time. This is an example
of:
15. All of the following are intangible benefits of information systems except
18. An entire information system can be broken down into its subsystems by using a
Conversion → p 539, qz
20. To understand and define the contents of data flows and data stores, system
builders use
Untuk memahami dan mendefinisikan konten aliran data dan penyimpanan data,
pembuat sistem menggunakan
21. Mining location in bengkulu, could attract investor through their formal website
True?
22. Which of the following is not one of the six main elements in the business
intelligence environment discussed in this chapter?
False
26. Business intelligent collect data which must categorize and then build KPI model
entah, True deh
27. Enterprise systems improve management decision making in all the following
ways except:
products → p 421
30. CEO may use balance score card indicators in their dss dashboard to aware
problems
True → p 511
31. Which of the following is a milestone for the website development phase of
building an e-commerce presence
33. Different symptoms make people unaware that they caught by covid 19, swab test
work as business intelligent to alert the similarity of the symptoms gatau mek e iya
keke
34. Business intelligent used big data created by programmers and managers gatau
True?
Tp lek mksde big data sources came from false soale came from internet users
35. New level of global coordination of all of the major business functions permit the
location of business activity according to
Comparative advantage → p 603, qz
36. Knowledge has value, form, and location → p 455, haruse bener tp value ini gada
38. The … reviews and approves plans for systems in all divisions
39. The idea that the achievement of quality control is an end in itself describes a
main concept of
TQM → p 529
40. …. Involves placing ads in social network newsfeeds or within traditional editorial
content, such as newspaper article
Netflix
43. Virtually all expert systems deal with problems, nde qlet jwbane classification?
Kok menurutku b/c, policy dev / imprecise rules soale
P 462, 429
44. Building system using traditional system life cycle is more acceptable than
prototyping keknua false? Iyo kek e wkwk
45. Vestas Wind System improve wind turbines placement for optimal energy output by
using IBM Big Insights Software and IBM “Firestorms” Supercomputer to analyze
structure and unstructured data such as weather reports, tidal phases, etc
True?
46. Input from Radiology could be process through AI hidden layer and give
alternative solution to physicians
True, tp mbo deng, hidden layer e bener, tp give alternative solution? AI ne malah ngasi
prediction instead of solutions
47. The dimension of … in information quality describes whether the structure of data is
consistent
Integrity → p 499
48. Business intelligent mining data from social media by identifying habits and
preference of the members gataaoo
TRUE ?Kyke iyo, ada bab sg bahas how facebook ngasi recommendation ke kita abis
buka page tertentu, trus lek kek de ig kt sering buka mukbang” Misal ntar nde
preference lak full of mukbang jg
Tp jd skeptis dr no 1-48 iki kok true kabeh yo drtd wkwk HAHAH YAJUGA
49. As described in the text, which of the following is not a risk factor in information
systems projects?
50. Expert system can be used to categorize garbage and give higher value added to end
products gatao
51. The major dimensions of international systems architecture include each of the
following except
53. Modern medical technology can help physicians acknowledge the source of
illness (haruse iya??), gatau :’
59. All of the following are indications of a failed information systems project except:
Employees require training to properly use the system → iki sg paling bgs soale,
60. You have been hired by a firm in a non-information-intensive industry to evaluate its
inventory of systems and IT projects. Which types of projects should the firm focus on?
a.
W
AN
b.
Wi
-Fi
c.
MAN
d.
L
A
N
a.
d.
a.
Sensor dan data link yang dapat mengurangi waktu rawat inap
b.
Kartu keanggotaan konsumen
c.
a.
c.
d.
a.
d.
a.
menemukan hubungan tersembunyi dalam data.
b.
meringkas sejumlah besar data ke dalam laporan tradisional yang jauh lebih kecil. c.
dengan cepat membandingkan data transaksi yang dikumpulkan selama bertahun-
tahun.
d.
mendapatkan jawaban online untuk pertanyaan ad-hoc dalam waktu yang cepat.
Dalam organisasi besar, manakah dari fungsi berikut yang bertanggung jawab untuk desain
dan pemeliharaan basis data fisik?
a.
Information policy
administration b.
Database
administration c.
Data
administration d.
Data auditing
a.
bo
oks
b.
azimuth-
interactive.com c.
books.azimuth-
interactive d.
com
Dalam metode enkripsi apa kunci enkripsi tunggal dikirim ke penerima sehingga pengirim
dan penerima berbagi kunci yang sama?
a.
b.
c.
Private key
encryption d.
Distributed encryption
a.
b.
c.
Mengurutkan transfer
paket d.
Memecah pesan menjadi paket
a.
Sni
ffer
b.
SQL injection attack
c.
Ransomwar
e d.
Worm
Big data merupakan:
Empat jenis perubahan struktural organisasi yang dimungkinkan oleh teknologi informasi,
dari yang paling kecil hingga yang paling berisiko, adalah
b.
c.
d.
Bidang yang diidentifikasi dalam tabel sebagai tempat pengidentifikasi unik dari
catatan tabel disebut:
a.
primary
field. b.
unique
ID c.
key field.
d.
primary key.
Berikut ini adalah tantangan keamanan khusus yang mengancam sistem
perusahaan di lingkungan klien/server, kecuali:
a.
pencurian
data. b.
radia
si. c.
perubahan data.
d.
menyalin data.
a.
keamanan yang
buruk. b.
inkonsistensi data.
c.
d.
a.
Berikut adalah pernyataan yang benar mengenai Business Information Value Chain:
a.Management activities meliputi koleksi data, transformasi data, dan penyebaran data
c.Business Information Value Chain terdiri dari management activities dan business
activities aku inii
a.
b.
c.
d.
a.
Sosiol
ogi b.
Input-proses-
output c.
Teknol
ogi d.
Value chain sistem informasi
Salah satu faktor yang perlu dipertimbangkan dalam internasionalisasi bisnis adalah praktik
akuntansi. Manakah dari pernyataan berikut tentang praktik akuntansi di berbagai negara
yang tidak benar?
a.
Perusahaan Jerman umumnya tidak mengakui keuntungan dari suatu usaha sampai proyek
selesai sepenuhnya dan mereka telah dibayar
b.
Praktik akuntansi A.S. berfokus pada menunjukkan kepatuhan terhadap aturan yang
ketat abc aku nemu, b doang ag
c.
d.
Perusahaan Inggris mengakui keuntungan sebelum proyek selesai, setelah mereka cukup
yakin mereka akan mendapatkan uang
P 571, p 604
Dari segi strategi dan struktur bisnis global, strategi eksportir domestik adalah
a.
c.
memusatkan produksi, akuntansi, sumber daya manusia, dan manajemen strategis, dan
menggunakan model campuran penjualan dan pemasaran
d.
Clear my choice
Manakah dari berikut ini yang bukan merupakan isu teknologi penting untuk
dipertimbangkan ketika mengembangkan sistem informasi internasional?
a.
c.
d.
Standarisasi platform komputasi global
Walmart menjadi leader di industrinya karena:
a.
a.
Memfasilitasi
kolaborasi b.
Optimasi
pendapatan c.
Menghubungkan perusahaan dengan pengetahuan dari
eksternal d.
Mengelola berbagi informasi mengenai order dan produksi
a.
Take the action that achieves the higher or greater value adalah candidate ethical principle
……..
a.
Risk
aversion
b.
Slippery slope
rule c.
Golden rule
d.
Utilitar
ian
Seorang karyawan mengklik tautan dalam email dari seseorang yang menyamar karyawan.
Kemudian dibawa ke situs web palsu yang meminta informasi pribadi adalah contoh dari:
a.
phishi
ng. b.
pharmi
ng c.
click
fraud.
d.
DDOS attack.
Sebuah skema dari seluruh database yang menggambarkan hubungan dalam database
disebut
a.
intersection relationship
diagram. b.
data definition diagram.
c.
entity-relationship diagram.
d.
data dictionary.
Sarbanes-Oxley Act:
a.
b.
c.
a.
b.
c.
d.
Waktu sama dan tempat berbeda
b.
a.
d.
Pernyataan yang benar mengenai cloud computing adalah sebagai berikut, kecuali:
a.
Infrastruktur yang tidak dapat menggunakan jaringan privat untuk akses , berbagi,
dan mengirim informasi
b.
Organisasi dan Teknologi Informasi memiliki hubungan timbal balik yang dapat
dimediasi oleh faktor-faktor berikut, kecuali:
a.
Lingkung
an b.
Pol
itik
c.
Proses Bisnis
d.
a.
phish
ing b.
DoS
c.
DD
oS
d.
SQL injection
c.
Jaringan Wi-Fi tidak rentan terhadap pelanggaran keamanan.
d.
Jaringan perusahaan tanpa akses ke Internet lebih aman daripada jaringan yang
menyediakan akses.
Manakah dari berikut ini yang merupakan deskripsi terbaik dari sebuah protokol dalam
arsitektur jaringan telekomunikasi?
a.
d.
Manakah dari berikut ini yang memungkinkan DBMS mengurangi redundansi dan
inkonsistensi data?
a.
Manakah dari berikut ini yang bukan merupakan karakteristik dari packet
switching? a.
Manakah dari berikut ini yang akan menjadi penggunaan terbaik dari RFID untuk bisnis
a.
b.
c.
Mencatat transaksi
d.
Layanan apa yang mengubah nama bahasa websites menjadi alamat IP?
a
.
F
T
P
b
.
D
N
S
c.
HT
TP
d.
HT
ML
Seorang salesperson mengklik berulang kali pada iklan online pesaing untuk
menaikkan biaya iklan pesaing. Ini adalah contoh dari:
a.
spoofi
ng b.
pharmi
ng. c.
click fraud.
d.
phishi
ng.
Jenis jaringan mana yang paling sesuai untuk bisnis yang terdiri dari tiga karyawan
dan seorang manajer yang berlokasi di ruang kantor yang sama, yang kebutuhan
utamanya adalah berbagi dokumen?
a.
Domain-based
LAN b.
MAN
c.
Peer-to-peer network
d.
W
A
N
b.
Digi
tal
c.
Opti
cal
d.
Analog
Layanan apa yang mengubah nama bahasa websites menjadi alamat IP?
a.
D
N
S
b.
FTP
c.
HT
TP
d.
HT
ML
Manakah dari berikut ini yang akan menjadi penggunaan terbaik dari RFID untuk
bisnis? a.
Menurunkan biaya
jaringan b.
Mencatat transaksi
c.
d.
Chapter 4
1) Which of the following best describes how new information systems can result
in legal gray areas?
A) They work with networked, digital data, which are more difficult to control than
information stored manually.
B) They result in new situations that are not covered by old laws.
D) They are created from sets of logical and technological rules rather
than social or organizational mores.
E) They are little understood by politicians or lawyers.
2) Which of the following best describes the effect that new information
technology has on society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
B) System quality
E) Quality of life
1) Which of the following best describes how new information systems can result
in legal gray areas?
A) They work with networked, digital data, which are more difficult to control than
information stored manually.
B) They result in new situations that are not covered by old laws.
D) They are created from sets of logical and technological rules rather
than social or organizational mores.
E) They are little understood by politicians or lawyers.
2) Which of the following best describes the effect that new information
technology has on society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
B) System quality
E) Quality of life
1) Which of the following best describes how new information systems can result
in legal gray areas?
A) They work with networked, digital data, which are more difficult to control than
information stored manually.
B) They result in new situations that are not covered by old laws.
D) They are created from sets of logical and technological rules rather
than social or organizational mores.
E) They are little understood by politicians or lawyers.
2) Which of the following best describes the effect that new information
technology has on society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
3) The obligations that individuals and organizations have concerning rights to intellectual
property involve which of the following moral dimensions of the information age?
B) System quality
E) Quality of life
C) System quality
E) Quality of life
5) Which of the following is not one of the current key technology trends that
raises ethical issues?
A) Data storage improvements
6) Which of the five moral dimensions of the information age do the central business
activities of DoubleClick involve?
A) Property rights and obligations
B) System quality
D) Quality of life
B) Phishing
C) Spamming
D) Targeting
E) Spyware
B) FIP
C) NORA
D) COPPA
E) Spyware
D) System quality
E) Quality of life
10) Routine violations of individual privacy are made easier by advances in data storage.
Answer: TRUE
11) In today's legal environment, managers who are convicted for the illegal use of
information
systems are still unlikely to be given a prison
sentence. Answer: FALSE
12) Ethics describes the principles of right and wrong that can be used by
individuals to make choices to guide their behavior.
Answer: TRUE
16) means that you accept the potential costs and obligations for the
decisions you make.
A) Responsibility
B) Accountability
C) Liability
D) Due process
E) Duty
B) Accountability
E) Liability
18) is a feature of law-governed society and involves having laws that are
known and understood, along with the ability to appeal to higher authorities to
ensure that the laws are applied correctly.
A) Liability
B) Due process
C) Responsibility
D) Accountability
19) All of the following are steps in the process for analyzing an ethical issue except:
A) assigning responsibility.
20) A colleague at work takes small amounts of office supplies for her own personal
use, saying that this is a tiny loss to the company. You tell her that if everyone were
to take office supplies, then the loss would no longer be minimal. Your rationale
expresses which of the following ethical principles?
A) Kant's Categorical Imperative
21) A man steals from a grocery store in order to feed his starving family.
Which of the following best expresses the utilitarian principle in evaluating
this situation?
A) His action is acceptable, because the grocer suffers the least harm.
B) His action is acceptable, because the higher social value is the survival of the family.
C) His action is wrong, because the man would not want the grocer to steal from him.
22) Which of the following best describes Immanuel Kant's categorical imperative?
A) If an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) One should take the action that produces the least harm or incurs the least cost.
C) One can put values in rank order and understand the consequences of
various courses of action.
D) If an action is not right for everyone to take, it is not right for anyone to take.
E) You should act towards others as you would like them to act towards you.
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of
various courses of action.
D) if something someone else has created is useful to you, it has value, and you
should assume the creator wants compensation for this work.
E) if an action is not right for everyone to take, it is not right for anyone to take.
24) According to , you should take the action that produces the least harm.
25) Which ethical rule states that if an action cannot be taken repeatedly, it is not
right to take at all?
A) Slippery-slope rule
B) Lemming rule
C) High-failure cost rule
D) Utilitarian principle
E) Golden Rule
26) Which of the following ethical guidelines suggests that you put yourself in
the place of others, and think of yourself as the object of the decision?
A) Kant's categorical imperative
33) In 2010, the FTC added all of the following recommendations to its privacy
guidelines except:
A) firms should build products and services that protect privacy.
C) firms should require consumer consent and provide clear options to opt out of data
collection.
D) firms should limit the length of time that any personal data is stored to six months or
less.
E) consumers should be able to review and contest the accuracy and completeness of
data.
34) Which of the following restricts the information that the U.S. federal
government can collect about an individual and regulates what it can do with the
information?
A) The Privacy Act
D) COPPA
E) HIPPA
37) Which of the following U.S. laws gives patients access to personal medical
records and the right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
38) Which of the following is not a U.S. federal law affecting private institutions?
A) COPPA
B) HIPAA
C) Gramm-Leach-Bliley Act
39) All of the following laws apply to actions by the federal government except the:
B) Privacy Act.
E) E-Government Act.
E) nowhere, because they are only used during a visit and are discarded once a
visitor leaves the website.
41) What is not a feature of the General Data Protection Regulation (GDPR)?
A) It applies to all firms doing business in the EU.
B) P3P
C) PGP
D) FIP
E) safe harbor
B) opt-out
C) P3P
E) safe harbor
45) What percent of global Internet users use Google Search and other Google services
such as
YouTube?
B) Around 25 percent
C) About 50 percent
D) Nearly 80 percent
E) Over 90 percent
46) Which of the following forms of protection of intellectual property requires that
the property be the subject of a nondisclosure agreement?
A) Copyright
B) Patent
D) Trademark
E) Trade secret
47) All of the following are technical solutions to protecting user privacy except:
A) email encryption.
B) anonymous surfing.
C) anonymous email.
48) Which of the following protects the authors of a book from having their
work copied by others?
A) Patent protection
B) Due process
C) Copyright law
49) "Look and feel" copyright infringement lawsuits are concerned with:
50) The NAI is an industry association formed to help with which of the following?
A) Copyright protection
C) Patent protection
D) Trademark protection
A) Musical compositions
B) Motion pictures
C) Maps
D) Artwork
E) Machines
52) Which of the following adjusts copyright laws to the Internet age by making
it illegal to circumvent technology-based protections of copyrighted materials?
A) Digital Millennium Copyright Act
B) Privacy Act
E) Cookies can be combined with other website data to develop detailed profiles of
customers.
54) Advertisers use in order to display more relevant ads based on a user's
search and browsing history.
A) behavioral targeting
B) Web bugs
C) NORA
D) intelligent agents
E) FIP principles
C) FIP principles
D) P3P
B) Trademark law
C) Patent law
E) Privacy law
Downloaded by bendahara genbi
(bendaharagenbi@gmail.com) lOMoARcPSD|
10271309
9
57) The is a feature of the GDPR that allows individuals to have their
personal information removed from social network and search sites.
A) right to opt-out of data collection
C) right to be forgotten
B) The requirement that the work reflect some special understanding and contribution
59) Which of the following is not true about the changes to EU data protection
rules enacted in the GDPR?
A) The new rules require Internet companies to obtain explicit consent from
consumers for the use of their personal data.
B) The new rules require Internet companies to delete information at the user's request.
C) The new rules require Internet companies to retain information only as long
as absolutely necessary.
D) The new rules do not allow consumers to have their data removed from company
servers.
60) Digital media differs from a physical book in all of the following ways except:
A) ease of replication.
B) ease of alteration.
C) ease of transmission.
D) ease of global distribution.
61) Which of the following were involved in what has been called the patent trial of the
century?
B) Megaupload
C) Morpheus
D) Pandora
E) Grokster
Answer: TRUE
64) A Facebook user's visit to a website can be tracked even if they do not click a Like
button.
Answer: TRUE
66) Most Internet businesses do very little to protect the privacy of their customers.
Answer: TRUE
67) The DMCA requires ISPs to take down sites of copyright infringers they are hosting
when
the ISPs are notified of the
problem. Answer: TRUE
68) Any intellectual work product that isn't based on public knowledge can be
classed as a trade secret.
Answer: TRUE
Answer: TRUE
70) Software programs were unprotected by copyright law until the early 1990s.
Answer: FALSE
71) Websites are not required to honor web browsers' Do Not Track settings.
Answer: TRUE
Answer: TRUE
74) Some forms of illegal sharing of music files have declined as legitimate online
music stores have expanded.
Answer: TRUE
75) COPPA is a set of five principles developed by the FTC that most American and
European privacy law is based on.
Answer: FALSE
82) are not held liable for the messages they transmit.
B) Private individuals
D) Elected officials
E) European ISPs
83) Which of the following resulted in a Christmas Eve outage for millions of Netflix
customers?
D) A hacking attack
84) Which of the following is the most common reason that business systems fail?
A) Software bugs
B) Software errors
C) Hardware failures
D) Facilities failures
E) Data quality
E) It leads to employees being paid less for the total amount of work performed.
B) Cell phone spam usually comes in the form of SMS text messages.
D) Spamming has mushroomed because it is so inexpensive and can reach so many people.
88) Which of the five moral dimensions of the information age does the
weakening of boundaries between work and family life involve?
A) Quality of life
B) System quality
C) support for middle-management decision making may be offset by poor data quality.
B) Technostress
C) Digital divide
D) RSI
E) CTS
E) wrist injuries brought about by incorrect hand position when using a keyboard.
92) Which of the following occurs when muscle groups are forced through tens of
thousands of repetitions under low-impact loads?
A) CTS
B) CVS
C) RSI
D) Technostress
E) RSS
Answer: FALSE
95) Some experts believe that exposure to computers reduces intelligence and cognitive
abilities.
Answer: TRUE
96) Computer abuse refers to acts involving a computer that may not be
illegal but are considered unethical.
Answer: TRUE
B) Human resources
A) Identifying customers
B) Shipping a product
D) Hiring employees
E) Paying creditors
4) The function is responsible for making sure customers are aware of the
company's products.
A) finance and accounting
B) human resources
B) TPS
C) MIS
D) DSS
E) CRM
12) You have been hired by a non-profit organization to implement a system to handle
donations.
The system must be able to handle and record telephone, text, and Internet
donations, provide up-to-the-minute reports, and create highly customizable
mailing lists. In addition, event fundraisers need to be able to quickly access a
donor's information and history. Which of the following systems will best meet
these needs?
A) TPS
13) To monitor the status of internal operations and the firm's relations with
the external environment, managers need which of the following types of
system?
A) DSS
B) KWS
C) TPS
D) MIS
E) BIS
A) TPS
B) MIS
C) ESS
D) DSS
E) KMS
16) Which of the following would you use in order to determine which of your
suppliers has the best and worst records for meeting your production schedules?
A) MIS
B) TPS
C) UPS
D) DSS
E) CRM
17) A relocation control system that reports summaries on the total moving, house
hunting, and home financing costs for employees in all company divisions falls into
which of the following categories?
A) KMS
B) TPS
C) ESS
D) MIS
E) DSS
18) Non-typical business problems with causes and effects that are rapidly changing
are typically handled by which of the following types of information system?
A) MIS
B) TPS
C) ESS
D) DSS
E) KMS
19) Which of the following types of information systems are especially suited to
situations in which the procedure for arriving at a solution may not be fully
defined in advance?
A) MIS
B) TPS
C) DSS
D) KMS
E) RPS
20) Which type of information system would you use to forecast the return on
investment if your firm planned to switch to a new supplier that offered products at
a lower cost?
A) ESS
B) TPS
C) MIS
D) CRM
E) DSS
A) Operational
B) End-user
C) Middle management
D) Senior management
E) Knowledge workers
23) Which of the following systems would you expect to deliver data from external
events, and summarized information from internal MIS systems?
A) TPS
B) ESS
C) MIS
D) DSS
E) SCM
24) Which of the following would you use to forecast trends in your supplier's
industry that could affect your firm over the next five years?
A) ESS
B) TPS
C) MIS
D) DSS
E) KMS
25) Which of the following is a routine question that might be answered by an MIS system?
A) e-commerce.
B) e-business.
C) an intranet.
D) an extranet.
E) e-government.
27) All of the following are examples of business intelligence systems except a system that:
D) compares total annual sales figures for specific products to planned targets.
28) Which of the following types of systems typically use a digital dashboard to
display an array of charts and graphs of a business's key performance indicators?
A) MIS
B) TPS
C) ESS
D) CRM
E) SCM
30) Which of the following systems is designed to span functional areas, focus
on executing business processes across the firm, and include all levels of
management?
A) DSS
B) MIS
C) CRM
D) Enterprise applications
E) SCM
31) A(n) system collects data from various key business processes and
stores the data in a single, comprehensive data repository, usable by other parts of
the business.
A) transaction processing
B) enterprise
C) automatic reporting
D) management information
E) knowledge management
A) Resource planning
C) Enterprise support
D) Management information
E) Decision-support
34) Which of the following types of system enables management to make better decisions
regarding their suppliers?
A) SCM
B) TPS
C) KMS
D) ERP
E) MIS
36) Which of the following types of system would you use to manage
relationships with your customers?
A) CRM
B) MIS
C) CLE
D) CLU
E) KMS
37) Which of the following would you use to consolidate the relevant knowledge
and experience in the firm and make it available to improve business processes and
management decision making?
A) TPS
B) An extranet
C) KMS
D) CRM
E) MIS
38) You have been hired by BizCom, a business communications consultancy that
services many clients in different industries throughout the United States, to help it
improve its profit margin. BizCom provides customized recommendations for the
best use of a client's existing resources for improving internal communications,
typically delivered via documentation in different media. The company has
approximately 50 consultants, all of whom are located in its central headquarters in
Alexandria, Virginia. What type of system do you recommend that BizCom
install to improve its business processes and increase its profit margin?
39) You manage the IT department at a small startup Internet advertiser. You need
to set up an inexpensive system that allows customers to see real-time statistics
such as views and click- throughs about their current banner ads. Which type of
system will most efficiently provide a solution?
A) CRM
B) Enterprise system
C) Extranet
D) Intranet
E) MIS
40) Which of the following types of system helps coordinate the flow of information
between the firm and its suppliers and customers?
A) Intranet
B) Extranet
C) KMS
D) TPS
E) DSS
B) e-commerce
C) e-business
E) telecommunications
42) In , digital technology and the Internet are used to execute the
major business processes in the enterprise.
A) e-commerce
B) e-business
C) enterprise applications
D) MIS
E) SCM
43) Which of the following statements about the City Football Group and SAP’s
Challenger Insights, as described in the chapter case, is not true?
A) It was designed to share information with fans.
45) Cross-functional systems are being phased out in favor of systems that
support business processes within a single functional group, such as human
resources.
Answer: FALSE
50) Managers can use DSS to make decisions about problems that are unusual
and not easily specified in advance.
Answer: TRUE
60) The pet products chain you work for, Pets Galore, has noticed that one of its
brands of dog food is not selling nearly as well as anticipated. What information
systems of the business will you use to determine the reason for the poor sales?
Discuss what information you will retrieve from which system. Which of the
information systems will be most important for your analysis? Which of the systems
will be least important?
Answer: You might query operational level TPS to make sure that the product
is actually getting to the stores and being restocked. You could query MIS to
see average sales levels according to geography, location, and other factors to
see if there are any specific factors affecting the sales. You might query ESS to
see if the same dog food is being sold by competitors and what these prices
are. You might use DSS to see what factors could increase sales.
Assuming that the dog food is being properly stocked at the stores, the most
important systems to query are the managerial-level systems: MIS for
summaries of sales records to
help pinpoint any other factors; ESS to check competition, and DSS for
higher-level analysis to forecast possible solutions.
61) Identify and discuss the major types of information systems that serve the main
management groups within a business. What are the relationships among these
systems?
Answer: The four major categories of information systems are:
B) Permissions
C) Time zones
D) Language
E) Corporate culture
69) All of the following are capabilities of enterprise social networking tools except:
71) Which of the following tools would you use to evaluate and choose a
collaboration tool for your organization?
A) Virtual meeting system
B) Cloud collaboration
C) IBM Notes
72) Which of the following decisions requires knowledge based on collaboration and
interaction?
D) Which product design is the most efficient for the user in terms of energy use?
A) Improved quality
D) Improved innovation
A) A virtual world
B) Screen sharing
C) Collaborative writing
E) Telepresence
75) All of the following are reasons for the increased business focus on
collaboration and teamwork, except for:
A) the need for creating innovative products and services.
76) Which of the following statements regarding IBM Notes is not true?
77) Which of the following is not one of the four main classifications for
collaboration tools identified by the space/time matrix?
A) Synchronous/colocated
B) Same time/remote
C) Different time/remote
D) Remote/colocated
E) Same time/same place
B) E-mail
C) A MUD
D) A wall display
E) A virtual world
79) According to the chapter case, which of the following statements about
Glasscubes is not true?
A) Glasscubes has a large customer base of more than 50,000 customers spread
globally in over 100 countries.
B) Users can set up a free conference class for over 50 participants
without any prior booking or billing.
C) Glasscubes’ Team Collaboration feature allows team participants to have
conversations by posting messages on the workspace .
D) Glasscubes provides project management facilities such as Gantt charts, critical
path analysis, cost and time tracking of tasks, and comparison with estimates.
E) All data is remotely backed up using SSL encryption.
83) Global firms can collaborate from different locations at the same time using
synchronous collaboration tools.
Answer: TRUE
84) You have been hired to work with 8 employees from different branches of a
national business to help create a web application to be used to train new sales
employees. Identify six collaboration tools that are available to help the team work
together. Which single tool would be the most helpful for the project, in your
opinion, and why?
Answer: Collaboration tools include e-mail and instant messaging; social networking;
wikis; virtual worlds, collaboration platforms such as virtual meeting systems,
Google Apps/Google Sites. The most helpful of these might be a collaboration
platform because it would enable people to have discussions, calendars,
conferences, and share documents.
85) A website that allows citizens to file taxes online is a form of . Answer: e-government
86) You have been hired by an international architectural firm, with offices in
Singapore, Paris, and Mumbai. The firm would like architects and draftspeople
from different teams to be able to collaborate efficiently. How will you determine
what the best collaboration tools are for their needs?
Answer: The first step in evaluation is to determine what the collaboration
challenges are and to locate the firm in the time/space matrix. Secondly, for
each block of the matrix that the firm is in, determine what solutions are
available from which vendors. Third, analyze the products in terms of their
costs and benefits to the firm. Next, identify any risks involved with using the
product. Then, seek the help of potential users to identify implementation and
training issues. Finally, make a shortlist of tools and invite vendors to make
presentations.
87) How do collaborative business culture and business processes differ from
"command-and- control" firms?
Answer: In command-and-control organizations, the top leaders determine all
the really important matters and then order lower-level employees to execute
senior management plans. The job of middle management is to pass messages
back and forth up and down the hierarchy. Command-and-control firms
require lower-level employees to carry out orders without asking too many
questions, with no responsibility to improve processes, and with no rewards
for teamwork or team performance. If workgroups need help from another
work group, that is something for the bosses to figure out. Employees never
communicate horizontally, always vertically, so management can control the
process.
A collaborative business culture and business processes are very different.
Senior managers are responsible for achieving results but rely on teams of
employees to achieve and implement the results. Policies, products, designs,
processes, and systems are much more dependent on teams at all levels of the
organization to devise, to create, and to build. Teams are rewarded for their
performance, and individuals are rewarded for their performance
in a team. The function of middle managers is to build the teams, coordinate
their work, and monitor their performance. The business culture and
business processes are more social. In a collaborative culture, senior
management establishes collaboration and
teamwork as vital to the organization, and it actually implements
collaboration for the senior ranks of the business as well.
88) Why are "conversations" relevant to social business?
C) systems analyst.
D) CTO.
E) CIO.
A) CEO
B) CFO
C) CIO
D) CTO
E) CKO
B) acts as liaison between the information systems group and the rest of the organization.
92) The helps design programs and systems to find new sources of
knowledge or to make better use of existing knowledge in organizational and
management processes.
A) CTO
B) CSO
C) CKO
D) CPO
E) CEO
93) Which of the following is a firm's CPO responsible for?
A) Ensuring that the company complies with existing data privacy laws
E) Acting as liaison between the information systems group and the rest of the company
94) All of the following job categories are expected to grow over the next eight years
except:
B) software developers.
C) systems analysts.
D) computer programmers.
E) database administrators.
95) Which of the following job categories is expected to experience the most
growth over the next eight years?
A) Computer support specialists
B) Software engineers
C) Security analysts
D) Computer programmers
E) Database administrators
Answer: FALSE
98) The network and system administrator job category is among the fastest growing
IS/MIS
occupations.
Answer:
FALSE
Chapter 3
A) An organization is a stable, formal social structure that takes resources from the
environment and processes them to produce outputs.
B) An organization is a formal, legal entity with internal rules and procedures that
must abide by laws.
C) An organization is a collection of people and other social elements.
C) sociotechnical
D) behavioral
E) psychological
4) Which of the following statements about the technical view of organizations is not true?
5) Which of the following is not a major feature of organizations that impacts the use of
information systems?
A) Business processes
B) Environments
D) Agency costs
E) Leadership styles
A) Instant messaging
B) e-mail
C) Digital photography
D) PCs
C) professional bureaucracies.
D) adhocracies.
E) machine bureaucracies.
B) professional
C) divisionalized
D) multidivisional
E) ad hoc
A) Startup firm
B) University
D) Midsize manufacturer
E) Consulting firm
11) Along with capital, is the primary production input that the
organization uses to create products and services.
A) structure
B) culture
C) politics
D) feedback
E) labor
12) The divergent viewpoints about how resources, rewards, and punishments should
be distributed, and the struggles resulting from these differences are known as
organizational:
A) culture.
B) politics.
C) structure.
D) environments.
E) business processes.
13) Which of the following statements about disruptive technologies is not true?
A) Disruptive technologies radically change the business landscape and environment.
B) Disruptive technologies may be substitute products that perform better than other
products
currently being produced.
E) Firms that invent disruptive technologies as first movers always become market leaders.
14) As discussed in the chapter opening case, which of the following statements about
Tate & Lyle is not true?
A) In the 1970s, Tate & Lyle began to diversify from the sugar business to more
specialized agricultural food products.
B) Tate & Lyle gathered a large collection of financial accounting systems across
four regions and thirty operating facilities.
C) The solution management decided on was to centralize financial accounting at a
single location in Lodz, Poland.
D) The consulting firm Tata Consultancy Services was hired to implement the
new system and coordinate with Tate & Lyle financial groups.
E) Implementing the new system also gave managers the opportunity to revise
and simplify business processes based on industry best practices.
15) All organizations have bedrock, unquestioned assumptions that define their goals
and products. Answer: TRUE
16) A machine bureaucracy is a knowledge-based organization where goods and
services depend on the expertise and knowledge of professionals.
Answer: FALSE
B) network costs.
C) procurement.
D) agency costs.
E) transaction costs.
20) All of the following statements are true about information technology's impact
on business firms except:
A) it helps firms expand in size.
C) entrepreneurial endeavor.
E) entrepreneurial structure.
24) What is agency theory? How does information technology enable a firm to
reduce agency costs?
According to agency theory, the firm is viewed as a "nexus of contracts" among self-
interested individuals rather than as a unified, profit-maximizing entity. A principal
(owner) employs "agents" (employees) to perform work on his or her behalf. However,
agents need constant supervision and management; otherwise, they will tend to
pursue their own interests rather than those of the owners. As firms grow in size and
scope, agency costs or coordination costs rise because owners must expend more and
more effort supervising and managing employees. Information technology, by reducing
the costs of acquiring and analyzing information, permits organizations to reduce
agency
costs because it becomes easier for managers to oversee a greater number of
employees. By reducing overall management costs, information technology
enables firms to increase revenues while shrinking the number of middle
managers and clerical workers.
25) Which model is used to describe the interaction of external forces that affect an
organization's strategy and ability to compete?
A) Network economics model
26) Which of the following industries has the lowest barrier to entry?
A) Automotive
B) Computer chip
C) Solar energy
D) Airline
E) Small retailer
27) All of the following are competitive forces in Porter's model except:
A) suppliers.
C) disruptive technologies.
D) customers.
E) substitute products.
B) Traditional competitors
29) Which of the following substitute products would be of most concern for
a cable TV distributor?
A) Streaming music services
B) Broadcast TV
C) Satellite radio
D) On-demand Internet television
E) Terrestrial radio
C) develop synergies.
31) A firm can exercise greater control over its suppliers by having:
A) more suppliers.
B) fewer suppliers.
C) global suppliers.
D) local suppliers.
32) Amazon's use of the Internet as a platform to sell books more efficiently
than traditional bookstores illustrates which of the following strategies?
A) Low-cost leadership
B) Marketing effectiveness
E) Developing synergies
D) low-cost leadership, new market entrants, product differentiation, and focus on market
niche.
34) Walmart's continuous replenishment system allows it to do all of the following except:
B) market niche
C) mass customization
D) process efficiency
E) low-cost leadership
36) The ability to offer individually tailored products or services using the same
production resources as bulk production is known as:
A) mass marketing.
B) micromarketing.
C) micro customization.
D) niche customization.
E) mass customization.
38) Which of the following is not a true statement about value webs?
C) Value webs operate in a less linear fashion than traditional value chains.
D) Value webs are inflexible and cannot adapt quickly to changes in supply and demand.
39) Which of the following best illustrates the use of information systems to focus on
market niche?
A) A car manufacturer's website that lets you customize the features on the car you are
purchasing.
B) A restaurant chain analyzing local sales figures to determine which menu items to serve.
C) A bookseller selling an e-book reader that reads only the bookseller's books.
40) All of the following are IT-enabled products and services providing competitive
advantage
except:
B) Apple's iTunes.
42) Hilton Hotels uses its OnQ system for which of the following purposes?
43) Which of the following is a competitive force challenging the publishing industry?
A) categorizes five related advantages for adding value to a firm's products or services.
B) sees the supply chain as the primary activity for adding value.
C) categorizes four basic strategies a firm can use to enhance its value chain.
A) Inbound logistics, operations, outbound logistics, sales and marketing, and service
A) Inbound logistics
B) Operations
D) Service
E) Technology
47) Which of the following would a company employ to measure and compare
its business processes to similar processes of other companies within their
industry?
A) Benchmarking
B) Best practices
E) Secondary activities
48) The most successful solutions or methods for achieving a business objective are called:
A) value activities.
B) best processes.
C) core competencies.
D) best practices.
E) benchmarks.
49) Information systems can be used at the industry level to achieve strategic advantage
by:
50) In network economics, the value of a commercial software vendor's software products:
B) a value chain.
C) net marketplaces.
D) core competencies.
E) synergies.
D) Walmart's order entry and inventory management system to coordinate with suppliers
54) The idea that the more any given resource is applied to production, the lower the
marginal gain in output, until a point is reached where the additional inputs produce
no additional value, is referred to as:
A) the point of no return.
D) network inelasticity.
E) virtual economics.
55) Which of the following statements about network economics is not true?
B) The law of diminishing returns does not always apply to every situation.
57) Which of the following is an example of a keystone firm within a business ecosystem?
B) Low-cost leadership
59) The expenses incurred by a customer or company in lost time and resources
when changing from one supplier or system to a competing supplier or system are
known as:
A) retention costs.
B) preservation costs.
C) differentiation costs.
D) switching costs.
E) variation costs.
60) The model highlights the primary or support activities that add a margin
of value to a firm's products or services where information systems can best be applied
to achieve a competitive advantage.
A) competitive forces
B) value chain
C) bargaining power
D) new entrant
E) rivalry
B) auxiliary
C) secondary
D) service
E) support
B) support web
C) value web
D) consortium
E) net marketplace
A) expertise area
B) competitive advantage
C) growth driver
D) efficiency
E) core competency
64) Why does Amazon need to worry about competitors in online shopping?
67) The competitive forces model cannot be used to analyze modern digital firms which
face new
competitive forces that are not true of
traditional firms. Answer: FALSE
68) Customers are one of the competitive forces that affect an organization's ability
to compete. Answer: TRUE
69) High product differentiation is a sign of a transparent
marketplace. Answer: FALSE
70) The effect of the Internet has been to increase the bargaining power
of customers. Answer: TRUE
71) An efficient customer response system directly links consumer behavior to
distribution, production, and supply chains.
Answer: TRUE
72) Information systems are used to enable new products and services via product
differentiation. Answer: TRUE
73) Mass customization offers individually tailored products or services using the same
resources as mass production.
Answer: TRUE
74) Switching costs increase when customers are strongly linked to products
and platforms. Answer: TRUE
75) The value chain model classifies all company activities as either primary or
support activities. Answer: TRUE
76) In the value chain model, support activities are most directly related to the
production and distribution of the firm's products and services, which create
value for the customer.
Answer: FALSE
77) When the output of some units in a firm can be used as inputs to other units,
synergies develop, which can lower costs and generate profits.
Answer: TRUE
78) According to the network economics perspective, the more people offering
products on eBay's site, the greater the value of the site to all who use it.
Answer: TRUE
79) The term business ecosystem describes the loosely coupled but
interdependent networks of suppliers, distributors, outsourcing firms,
transportation service firms, and technology manufacturers.
Answer: TRUE
80) A firm can be said to have competitive advantage when it has access to resources that
others do
not.
Answer: TRUE
95) You are consulting for a natural food products distributor who is interested in
determining the benefits it could achieve from implementing new information
systems. What will you advise as the first step?
A) Identify the business ecosystem the distributor is in
B) strategic transitions.
C) systems alterations.
E) sociotechnical transitions.
97) Research has shown that a majority of firms are able to align their information
technology with their business goals.
Answer: FALSE
98) The use of Internet technologies allows companies to more easily sustain
competitive advantage.
Answer: FALSE
Chapter 4
C) support for middle-management decision making may be offset by poor data quality.
Chapter 5
B) Telephone
C) VOIP
D) Telecommunications
E) Data management
B) telecommunications standards.
C) technology standards.
D) Internet standards.
E) compatibility standards.
B) 5, 4, 2, 3, 1
C) 4, 5, 2, 3, 1
D) 5, 4, 2, 1, 3
E) 4, 5, 3, 2, 1
B) on-demand architecture.
E) divided architecture.
6) Which of the following became the standard PC in the Personal Computer Era?
A) Wintel PC
B) DOS PC
C) MITS PC
D) Altair
A) Metcalfe's Law
B) Moore's Law
C) Law of scalability
D) Law of outsourcing
E) Law of networks
Answer: TRUE
core internal
systems.
Answer: FALSE
area networks that enabled the widespread adoption of client/server computing and
local area
A) TCP/IP
B) COBOL
C) Ethernet
D) ASCII
E) Linux
A) Dell
B) Intel
C) Seagate
D) IBM
E) Cisco
A) is one type of cloud computing service where users pay only for the computing
capacity they actually use.
B) is a cloud-based service which provides software applications to users on demand.
18) Which of the following is not a part of the IT infrastructure ecosystem found in firms?
A) Consultant and system integrators
B) Internet platforms
C) Operating system platforms
20) The operating system is used to manage the software applications used in
business activities.
Answer: FALSE
A) Smartwatch
B) Smart glasses
C) Smartphones
D) Activity trackers
E) Smart ID badges
24) All of the following are current hardware platform trends except:
A) green computing.
B) virtualization.
C) cloud computing.
D) Unix.
E) quantum computing.
25) Which of the following is a recent addition to the mobile digital platform?
26) Which of the following enables a single physical resource (such as a server or a
storage device) to appear to the user as multiple logical resources?
A) Cloud computing
B) Autonomic computing
C) Virtualization
D) Multicore processing
E) Ubiquitous computing
A) infrastructure as a service.
B) platform as a service.
C) software as a service.
D) on-demand computing.
E) virtualization as a service.
28) Which of the following is not one of the characteristics of cloud computing, as
defined by the
D) Measured service
E) Reduced elasticity
B) legacy processor
C) scalable processor
D) aggregate circuit
E) green circuit
A) Capacity planning
B) Cloud computing
C) Green computing
D) Utility computing
E) On-demand computing
31) Quantum computing is implemented primarily with enterprise or ISP servers.
Answer: FALSE
37) ZipRealty, which combines Google Maps with real estate data, is an example of:
A) cloud computing.
B) SOA.
C) a widget.
D) a mashup.
E) a web service.
38) Which of the following is not one of the current software platform trends?
B) Open-source software
C) HTML5
D) Software outsourcing
E) Multicore processors
A) It plays a major role in the back office running local area networks.
devices.
40) A software program with a graphical user interface for displaying web pages
and for accessing the web and other Internet resources is called a web:
A) service.
B) client.
C) browser.
D) app.
E) beacon.
41) Which of the following is the foundation technology for web services?
A) XML
B) HTML
C) SOAP
D) UDDI
E) SCSI
42) Prewritten, commercially available sets of software programs that eliminate the
need for a
firm to write its own software programs for certain functions, are referred to as:
A) software packages.
B) mashups.
C) outsourced software.
D) open-source software.
B) Web browsers
C) SaaS
D) Web services
E) Web mashups
44) A formal contract between customers and their service providers that
outlines the specific
A) SOA.
B) SLA.
C) TCO.
D) RFQ.
E) SaaS
45) Web services can exchange information between two different systems only if
the operating
systems and programming languages upon which the systems are based are identical.
Answer: FALSE
46) Hypertext markup language specifies how text, graphics, video, and sound are
placed on a
webpage.
Answer:
TRUE
48) Which of the following refers to the ability of a computer, product, or system to
expand to
serve a larger number of users without breaking down?
A) Modality
B) Scalability
C) Expandability
D) Disintermediation
E) Customizability
49) Which model can be used to analyze the direct and indirect costs to help firms
determine the
B) Return on investment
C) Breakeven point
D) Cost-benefit analysis
13) List and describe four services that comprise IT infrastructure, beyond physical
devices and
software
applications.
Answer:
technological application. For example, the ASCII data standards made it possible for
different machines.
The standards that have been important for the growth of the Internet include
TCP/IP, as a networking standard, and WWW standards for displaying information as
web pages, including HTML.
21) Have mainframes disappeared?
Answer: Mainframes have not disappeared. They continue to be used to reliably and
securely handle huge volumes of transactions, for analyzing very large quantities of
data, and for handling large workloads in cloud computing centers. The mainframe is
still the digital workhorse for banking and telecommunications networks that are
often running software programs that are older and require a specific hardware
platform. Currently, mainframes process 30 billion business transactions per day, and
80 percent of the world's corporate data also originates on the mainframe.
22) Briefly explain why corporations are increasingly interested in using Unix or
Linux for their
operating systems.
Answer: Linux is an inexpensive and robust open-source relative of Unix. Unix and Linux
constitute the backbone of corporate infrastructure throughout much of the world
because they are scalable, reliable, and much less expensive than mainframe operating
systems.
They can also run on many different types of processors. The major providers of Unix
operating systems are IBM, HP, and Sun with slightly different and partially
incompatible versions. Although Windows continues to dominate the client
marketplace, many corporations have begun to explore Linux as a low-cost desktop
operating system provided by commercial vendors such as RedHat Linux and Linux-
based desktop productivity suites such as Sun's StarOffice. Linux is also available in free
versions downloadable from the Internet as open-source software. The rise of open-
source software, particularly Linux and the applications it supports at the client and
server level, has profound implications for corporate software platforms: cost,
reduction, reliability and resilience, and integration, because Linux works on all the
major hardware platforms from mainframes to servers to clients. Linux has the
potential to break Microsoft's monopoly on the desktop. Sun's StarOffice has an
inexpensive Linux-based version that competes with Microsoft's Office
productivity suite.
32) Distinguish between cloud computing, green computing, and quantum computing.
Answer: In cloud computing, technology services are provided over a network,
primarily the Internet. These may be infrastructure services, such as storage or
networking, or platform services, such as IBM's application development and test
service, or software services, such as salesforce.com. Green computing refers to
practices and technologies for designing computer equipment to minimize impact on
the environment. Quantum computing refers to emerging technology that uses the
principles of quantum physics to dramatically boost computer processing power.
33) An ad-hoc group of oceanographers needs to set up a system to analyze
massive amounts of
data on ocean temperatures. The technology and hardware for gathering the data and
transmitting
the data to a central computer is in place. What additional hardware might they need?
What techniques might they use to make their research more efficient and lower costs?
Answer: To store their data they may want to use a SAN. To process their data, they
will need a supercomputer. To lower costs, they could look at on-demand computing
as well as
34) What are the drawbacks of cloud computing? Do you think these ever outweigh
the benefits,
Answer: Students should be able to identify at least two drawbacks. Drawbacks include:
2. security risks in having critical systems and data entrusted to a firm that does
business with other firms.
3. loss of business capability if cloud infrastructures malfunction.
Student answers regarding the relative weight will vary, an example is: The
disadvantages of cloud computing outweigh the advantages, except if any data lost is
irreplaceable or creates harm to others. For example, a database of financial
information should remain the responsibility of the original firm so that they can be
held accountable.
35) What are the essential characteristics of cloud computing?
Answer: As defined by the U.S. National Institute of Standards and Technology, cloud
computing is characterized by on-demand self-service, ubiquitous network access,
location-
independent resource pooling, rapid elasticity, and measured service. On-demand
self- service means that consumers can use server time and network storage as they
need it on their own. Ubiquitous network refers to the ability to access cloud
resources across all devices and platforms, including mobile. Location independent
resource pooling describes the ability to allocate resources to any part of the world
without a dip in service quality.
Rapid elasticity is the capacity for resources to be increased or decreased as needed to
meet demand. Lastly, measured service refers to the payment technique whereby users
are charged based on the resources they use, as opposed to monthly or yearly rates.
36) What is virtualization and how and why is it used?
efficiently allocate them to meet specific application needs. SDS enables firms to replace
expensive storage hardware with lower-cost commodity hardware and cloud storage
87) Identify and describe five or more of the current trends in contemporary software
platforms.
Answer:
98) A small design agency you are consulting for will be creating client websites and wants
to
purchase a web server so they can host the sites themselves. How will you advise
them on this
purchase?
Answer: They need to understand total cost of ownership: the costs will go beyond the
cost of the server, but they will also need to purchase the server software and any
application software they will be using. They will also need someone in their IT
department to manage and maintain the computers. They will also incur facilities costs
for running the computer.
They need to have a backup plan should the server fail. The design agency will need to
add up all the potential costs and risks. Additionally, they need to prepare for their
plan if they need more servers. Will they eventually have to run and maintain their
own server farm?
What if one of their clients' sites is more popular than anticipated and the server has
difficulty handling the load? How quickly can they add servers or processing power?
The company should look at colocation, Web hosting services, and ASPs to see if their
needs will be better met this way.
51) You are starting a market research company with a single business partner
and are planning
the hardware and software needs for the two of you. Which factors should play into your
decision of how much to spend on these investments?
Answer: Using the competitive forces model for IT infrastructure investment, the
most relevant
• The firm's business strategy. What capabilities will we want to have over the next five
years?
• Alignment of IT strategy. How does our IT strategy match up with the business plan?
• IT assessment. What are the current technology levels for the services we are offering
and our
business type? We would probably not need to be at the bleeding edge, but not behind
the times
either.
• Competitor firm IT investments. How much are competitor firms investing in their
technology?
Because this is a startup, one other factor may not play such a large role: that of
market demand
for services. However, finding out the market demand for competitor's services may
uncover ways that this new company could have a competitive advantage.
Chapter 6
==============ICA======================================================
===============================================================
Which of the following systems would you expect to deliver data from external
events, and summarized information from internal MIS systems?
Select one:
a. SCM
b. TPS
c. DSS
d. MIS
e. ESS
Bandwidth is the:
Select one:
c. Enterprise software
applications d. Virtual reality
systems
e. Internet platforms
Which of the following refers to policies, procedures, and technical measures used
to prevent unauthorized access, alteration, theft, or physical damage to
information systems?
Select one:
a. Security
b. Identity management
c. Algorithms
d. Benchmarking
e. Controls
Select one:
c. A device that handles the switching of voice and data in a local area network
Select one:
a. NORA
b. behavioral targeting
c. intelligent agents
d. Web bugs
e. FIP principles
Select one:
b. Survival
c. Operational excellence
d. Customer intimacy
e. Competitive advantage
Which type of network treats all processors equally and allows peripheral devices to
be shared without going to a separate server?
Select one:
a. Wireless
b. MAN
c. LAN
d. Peer-to-peer
Select one:
a. network standards.
b. technology standards.
c. telecommunications standards.
d. Internet standards.
e. compatibility standards.
Which of the following is not a major feature of organizations that impacts the use
of information systems?
Select one:
a. Business processes
b. Leadership styles
c. Environments
e. Agency costs
Non-typical business problems with causes and effects that are rapidly changing are
typically handled by which of the following types of information system?
Select one:
a. DSS
b. KMS
c. MIS
d. TPS
e. ESS
Select one:
a. Liability
c. Due process
e. Accountability
Place the following eras of IT infrastructure evolution in order, from earliest to most
recent: 1. Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer;
and 5. Mainframe and Minicomputer.
Select one:
a. 4, 5, 2, 3, 1
b. 5, 2, 3, 4, 1
Which of the following factors does not help explain why computing resources today are
even more available than in previous decades?
Select one:
d. Network economics
e. Moore's law
Select one:
a. Managerial
b. Organizational
c. Social
d. Auxiliary
e. Governmental
If sales of your products declined in a specific region of the country, which of the
following types of system would best help you understand why?
Select one:
a. MIS bner gaaa? Iyaa benerr!!
b. TPS
c. CRM
d. DSS
e. ESS
Which type of network treats all processors equally and allows peripheral devices to be
shared without going to a separate server?
Select one:
b. Wireless
c. LAN
d. MAN
e. Peer-to-peer
d. compares total annual sales figures for specific products to planned targets.
Select one:
Select one: ini apaaaa gatauuuuuu iyaa we ini apa apaniiiii, gatauu woii
d. It prevents data from being altered retroactively. (di quizlet jawabannya ini)
Select one:
a. Language
b. Privacy
c. Time zones
d. Permissions
e. Corporate culture
Which of the following protects the authors of a book from having their work copied
by others? Select one:
a. Due process
b. Patent protection
e. Copyright law
Which model is used to describe the interaction of external forces that affect an
organization's strategy and ability to compete?
Select one:
Select one:
All of the following are examples of environmental actors in an information system except:
Select one:
regulatory agencies.
suppliers.
customers.
competitors. e. sales force.
Select one:
a. Disruptive technologies may put entire industries out of business.
b. Disruptive technologies may be substitute products that perform better than
other products currently being produced.
c. Disruptive technologies may sometimes simply extend the marketplace.
d. Firms that invent disruptive technologies as first movers always become market leaders.
e. Disruptive technologies radically change the business landscape and environment.
b. Software errors
c. Software bugs
d. Hardware
failures e. Data
quality
A DBMS makes the:
Select one:
b. MIS
c. TPS
d. DSS
e. KMS
Select one:
a. divided architecture.
b. service-oriented architecture.
c. two-tiered client/server architecture.
d. multi-tiered client/server architecture.
e. on-demand architecture
All of the following are technical solutions to protecting user
privacy except: Select one:
a. anonymous email.
b. email encryption.
c. anonymous surfing.
Which of the following is a specialized language that programmers use to add and
change data in the database?
Select one:
b. DBMS
A field identified in a table as holding the unique identifier of the table's records
is called the: Select one:
a. unique ID.
b. primary field.
c. primary key.
d. key field.
e. primary entity.
Select one:
a. phishing
b. radiation.
c. sniffing.
d. tapping.
All of the following are specific security challenges that threaten the communications lines in a
client/server environment except:
Select one:
a. tapping.
b. phishing
c. radiation.
d. theft and fraud.
e. sniffing.
All of the following are technical solutions to protecting user privacy except:
Select one:
a. email encryption.
b. anonymous email.
c. preventing client computers from accepting cookies.
d. data use policies.
e. anonymous surfing.
a. modulated
b. digital
c. analog
d. broadband
e. T1
A salesperson clicks repeatedly on the online ads of a competitor in order to drive the
competitor's advertising costs up. This is an example of:
Select one:
a. click fraud.
b. pharming.
c. phishing.
d. spoofing.
e. evil twins.
Which of the following is not one of the six strategic business objectives of information systems?
Select one:
a. New products and services
b. Survival
c. Competitive advantage
d. Improved community relations
e. Improved decision making
b. Cookies can be combined with other website data to develop detailed profiles of
customers.
Which of the following systems would you expect to deliver data from external
events, and summarized information from internal MIS systems?
Select one:
a. SCM
b. ESS
c. DSS
d. MIS
e. TPS
Select one:
a. top-level domain.
d. host domain.
e. network domain.
Which of the following occurs when the same attribute in related data files has different
values?
Select one:
a. Data dependence
b. Data duplication
c. Data redundancy
d. Data discrepancy
e. Data inconsistency
Which of the following is not an IT infrastructure service component?
Select one:
a. Physical facilities management to manage the facilities housing physical components
b. IT education services that provide training to employees
c. Operating system software
d. IT management services to plan and develop the infrastructure and provide
project management
e. Computing platforms to provide a coherent digital environment
All of the following statements are true about information technology's impact on
business firms except:
Select one:
a. it helps reduce agency costs.
b. it helps reduce transaction costs.
c. it helps firms lower the cost of market participation.
d. it helps firms expand in size.
e. it helps reduce internal management costs.
Select one:
Which of the following deals with behavioral issues as well as technical issues
surrounding the development, use, and impact of information systems used by
managers and employees in the firm?
a. Information systems literacy
Select one:
b. Information technology infrastructure
c. Information systems architecture
d. Business processes
e. Management information systems ini bukan? IYA INI
Select one:
Select one:
a. TPS
b. ERP
c. KMS
d. SCM
e. MIS
Which of the following best illustrates the relationship between entities and
attributes?
Select one:
Select one:
b. Value webs are inflexible and cannot adapt quickly to changes in supply and
demand.
d. Value webs operate in a less linear fashion than traditional value chains.
e. Value webs involve a collection of independent firms that use information
technology to coordinate their value chains.
Select one:
a. A communications service for microcomputer users
b. The main computer in a telecommunications network
c. A device that handles the switching of voice and data in a local area network
d. A standard set of rules and procedures for control of communications in a network
e. A pathway through which packets are routed
Select one:
a. IoT.
b. co-creation of business value.
c. big data.
d. cloud computing.
e. the mobile digital platform.
c. cloud computing.
d. big data.
Select one:
a. product differentiation
b. low-cost leadership
c. process efficiency
d. mass customization
e. market niche
Client/server computing is a:
Select one:
c. distributed computing model where clients are linked to one another through a
network that is controlled by a network server computer.
Select one:
a. Fulfilling a customer order
b. Shipping a product
c. Hiring employees
d. Identifying customers
e. Paying creditors
Bandwidth is the:
Select one:
a. number of frequencies that can be broadcast through a medium.
b. number of cycles per second that can be sent through a medium.
c. difference between the highest and lowest frequencies that can be accommodated on
a single channel.
d. total number of bytes that can be sent through a medium per second.
e. geographical distance spanned by a network.
Select one:
d. Security policy
e. Risk assessment
Select one:
Non-typical business problems with causes and effects that are rapidly changing are
typically handled by which of the following types of information system?
Select one:
a. TPS
b. KMS
c. ESS
d. MIS
e. DSS
Select one:
a. Auxiliary
b. Governmental
c. Organizati
onal d.
Managerial
e. Social
The expenses incurred by a customer or company in lost time and resources when changing from
one supplier or system to a competing supplier or system are known as:
Select one:
a. variation costs.
b. switching costs.
c. preservation costs.
d. retention costs.
e. differentiation costs.
Which of the following is not one of the six strategic business objectives of information
systems?
Select one:
a. Competitive advantage
b. New products and services
c. Survival
d. Improved community relations
e. Improved decision making
Select one:
a. network domain.
b. Internet root domain.
c. third level domain.
d. host domain.
e. top-level domain. Sumber dari Web domain asia
Which of the following roles in a firm would be least affected by using mobile
devices to access firm information systems?
Select one:
a. Sales executives
b. Senior executives
C. Production workers dari course hero
d. Knowledge workers
e. Operational managers
Which of the following types of system enables management to make better decisions regarding their
suppliers?
Select one:
a. TPS
b. ERP
c. KMS
d. SCM
e. MIS
Which of the following best illustrates the relationship between entities and attributes?
Select one:
a. The entity CUSTOMER with the attribute PURCHASE
b. The entity PURCHASE with the attribute CUSTOMER
c. The entity PRODUCT with the attribute CUSTOMER
d. The entity CUSTOMER with the attribute PRODUCT
e. The entity PRODUCT with the attribute PURCHASE
Which of the following refers to policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems?
Select one:
a. Benchmarking
b. Controls
c. Security
d. Algorithms
e. Identity management