(CHAPTER 1-4)

MANAGEMENT INFORMATION SYSTEMS

 

 

 

INSTRUCTIONS TO THE CANDIDATES:

 

Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

 

 

1.

Information is:

 

a.        the accumulation of raw data.

b.        the way we analyze problems.

c.        the best form of knowledge.

d.       Data shaped into meaningful form.

e.        Output that is returned to appropriate members of the organization, which allows them to correct future input.

 

 

 

 

2.

_______________________ systems depend on fixed definitions of data and procedures form collecting, storing disseminating, and using the data.

 

a.       Informal

b.      Modern

c.       Traditional

d.      Formal

e.       Bureaucratic   

 

 

 

 

3.

Promoting the organization’s products and services is a business function of

 

a.       manufacturing and production

b.      finance

c.       human resources

d.      sales and marketing

e.       accounting

 

 

 

 

 

 

4.

Information systems are _______________________ systems.

 

a.       behavioral

b.      sociotechnical

c.       technical

d.      optimizing

e.       efficient

 

 

 

 

5.

E-commerce and the use of Internet technology are driving the move toward:

 

a.       new tax laws.

b.      fiber-optic networks worldwide.

c.       multinational organizations.

d.      satellite communications systems.

e.       digital firms.

 

 

 

 

6.

The power of computer hardware and software has grown much more rapidly than:

 

a.       the ability of organizations to purchase the technology

b.      the ability of organizations to apply and use the technology

c.       worldwide internet usage

d.      governments can control

e.       telecommunications technologies

 

 

 

 

7.

Information systems are an outcome of culture, politics, work flows, standard operating procedures and.

 

a.       computer professionals.

b.      organizational structure

c.       economic need.

d.      the internet

e.       telecommunications requirements

 

 

 

 

8.

Integrating systems for different organizational levels and functions to freely exchange information:

 

a.       is not a requirement of the digital firm.

b.      will require the use of the mainframe system.

c.       can be technologically difficult and costly.

d.      has always been part of bureaucratic policy.

e.       does not require the managers be retrained.

 

 

 

 

 

 

 

 

9.

Market research and pricing are functions of

 

a.       finance/accounting systems.

b.      human resources systems

c.       manufacturing/production systems

d.      sales marketing systems

e.       decision support systems

 

 

 

 

10.

The interaction between information technology and organizations is very complex and is influenced by a great many mediating factors, including the organization structure, standard operating procedures, politics, culture, management decisions and:

 

a.       the surrounding environment.

b.      the economic basis of the company

c.       the availability of trained employers

d.      the cash flow within the company

e.       the microeconomic definition of the specific organization

 

 

 

 

11.

One reason Detroit automakers have between slow to adopt Japanese mass-production method is that:

 

  • they cannot change the design of their manufacturing plants.

  • they have difficulty in changing standard operating procedures.

  • U.S workers are much more highly paid

  • U.S workers do not adapt well to the Japanese procedures.

  • such changes have not been necessary.

  •  

     

     

     

    12.

    One way in which the organization affects information technology is through the decisions that it makes about:

     

    a.       how often equipment will be replaced.

    b.      whether computer expenditures are considered to be capital expenditures, or not.

    c.       who will design, build, and maintain the organization’s IT infrastructure.

    d.      how much influence company culture will have on technological decisions.

    e.       the formal organizational unit or function responsible for technology services.

     

     

     

     

    13.

    In the early years, the information systems group was composed mostly of:

     

    a.       systems analysts.

    b.      mid-level managers.

    c.       end users.

    d.      clerical workers.

    e.       programmers.

     

     

     

     

     

     

    14.

    According to the Mintzberg model of management, decisional roles are:

     

    a.       where managers initiate activities, handle disturbances, allocate resources, and negotiate conflict.

    b.      where managers act as figureheads and leaders for the organization. 

    c.       where managers act as a liaison, disseminating and allocating resources.

    d.      the expectations of the activities that managers should perform in an organization.

    e.       where managers act as the nerve centers of their organizations, receiving and disseminating critical facts.

     

     

     

     

    15.

    The ______________________ model is the model used to describe the interaction of external influences, specifically threats and opportunities, that affect an organization’s strategy and ability to compete.

     

    a.       network economics

    b.      competitive forces

    c.       strategic transitions

    d.      environmental conditions

    e.       interactive economics

     

     

     

     

    16.

     

     

    Digital firms require:

     

    a.       massive computer capacities.

    b.      deep pockets.

    c.       new organizational designs and management processes.

    d.      exceptionally flexible transaction processing systems.

    e.       networks that bypass traditional distribution channels.

     

     

     

     

    17.

    New levels of richness and reach are enabled on the Internet by  _____________

     

    a.       the explosion of connectivity.

    b.      easier coordination of function.

    c.       the dissemination of standards.

    d.      a and c

    e.       b and c

     

     

     

     

    18.

    Yahoo! is an example of:

     

    a.       a search engine.

    b.      a portal.

    c.       a Web browser.

    d.      a syndicator.

    e.       a directory.

     

     

     

     

     

     

     

     

     

    19.

    Members of the organization use intranets to create:

     

    a.       a collaborative environment.

    b.      new services for customers.

    c.       a supply chain.

    d.      an organization requiring fewer middle managers.

    e.       better operations control.

     

     

     

     

    20.

    Companies pursuing electronic commerce must be especially vigilant about:

     

    a.       maintaining updated transaction files.

    b.      establishing a well-designed Web site.

    c.       maintaining a shopping cart and online credit transactions.

    d.      establishing trust, security, and consumer privacy.

    e.       constantly updating their business plan.

     

     

     

     

    21.

    An example of Web-based supply chain management is:

     

    a.       the use of intranet collaboration tools for contact management, discussion forums, document management, and calendars.

    b.      the ability to monitor un-invoiced income or outstanding debt each day.

    c.       the provision of data on quality measurements, such as defects and rejects, as well as maintenance and training schedules.

    d.      allowing employees to manage their own health and pension benefits accounts.

    e.       using a Web-based forecast to maximize the profitability of shelf space for the company’s products.

     

    22

    Internet-based systems are more vulnerable to penetration by outsiders than private networks because:

     

    a.   so many people see each message.

    b.   most Internet companies do not have adequate firewalls.

    c.   the Internet was designed as an open environment.

    d.   a computer in the home environment is insecure.

    e.   it is international.

     

     

    23

    Manufacturing and production data from disparate systems can coordinate manufacturing and production processes using the common platform created by:

     

    a.   Internet technology.

    b.   supply chain logistics.

    c.   extranets.

    d.   intranets.

    e.   telecommunications systems.

     

     

     

    24

    The _________________________ environment for electronic commerce has not been fully established.

     

    a.   linguistic

    b.   coding

    c.   satellite

    d.   legal and regulatory

    e.   administrative and merchandising

     

     

     

     

     

     

     

    25

    Many virtual storefront organizations do not provide finances in the business plan to provide for:

     

    a.   new telecommunications lines.

    b.   additional shipping expenses and skilled Web staff.

    c.   the necessary software.

    d.   the unexpected increase in orders.

    e.   the consulting expenses connected with an ISP.

     

     

     

     

     


     

    (CHAPTER 5-8)

    MANAGEMENT INFORMATION SYSTEMS

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

     

    1.

    Information technology and information systems raise new ethical questions for both individuals and societies because:

     

    a.   they are global in their effects.

    b.   they are difficult for governments to regulate.

    c.   so few people understand them.

    d.   they create opportunities for intense social change.

    e.   they change so quickly.

     

     

    2.

    Many Web sites allow the Internet advertising broker DoubleClick to:

     

    a.   gather cookies from their site in return for advertisements on other sites based on the visitor profile created.

    b.   access their sales figures.

    c.   mine large pools of data they have collected in their business endeavors.

    d.   place advertisements for other organizations on their Web site.

    e.   track the activities of their visitors in exchange for revenue from advertisements based on visitor information.

     

     

    3.

    The Federal Trade Commission Fair Information Practice principle of Access/Participation states that:

     

    a.   customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction, including internal use and transfer to third parties.

    b.   data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

    c.   there is a mechanism in place to enforce FIP principles.

    d.   Web sites must disclose their information practices before collecting data.

    e.   consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process.

     

     

    4.

    Cookies are stored:

     

    a.   on the user’s hard drive.

    b.   on the Web site.

    c.   in a temporary file in the memory of the user’s computer.

    d.   at the ISP.

    e.   on the browser.

     

     

    5.

    The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain:

     

    a.   when the courts become involved.

    b.   when hackers are able to break into the source code.

    c.   when the software is widely distributed.

    d.   when a new version of the software is released.

    e.   because there are no sanctions on copying software.

     

     

    6.

    In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:

     

    a.   digital shareware.

    b.   common carriers.

    c.   services.

    d.   non-essential systems.

    e.   like books.

     

     

    7.

    Information, knowledge, computers, and access to these resources through educational institutions in public libraries are inequitably distributed:

     

    a.   because of industrial competition.

    b.   along ethnic and social class lines.

    c.   only in the United States.

    d.   in every country but the United States.

    e.   because it is difficult to learn to use software.

     

     

    8.

    A microsecond is:

     

    a.   1/1,000 second.

    b.   1/1,000,000 second.

    c.   1/10,000,000 second.

    d.   1/1,000,000,000 second.

    e.   1/1,000,000,000,000 second.

     

     

    9.

    Batch processing is a method of collecting and processing data in which transactions:

     

    a.   are accomplished by one large central computer.

    b.   are accumulated and stored until a specified time when it is convenient or necessary to process them as a group.

    c.   are entered directly into the computer system and processed immediately.

    d.   are processed among multiple computers linked by communications network.

    e.   are technologies for transferring audio and video data to be processed as a steady and continuous stream as they are downloaded from the Web.

     

     

    10.

    The interface component in client/server computing is:

     

    a.   the way in which the various applications connect with each other.

    b.   a feature of thin client computing.

    c.   necessary only if a mainframe is involved.

    d.   how the application appears visually to the user.

    e.   shaped by the organization’s business rules.

     

     

    11.

    Virtual storage:

     

    a.   allows many programs to share a computer system’s resources at any one time through concurrent use of the CPU.

    b.   links together two or more CPUs to work in parallel in a single computer system.

    c.   handles programs more efficiently by breaking down the programs into tiny sections that are ready to use memory only when needed.

    d.   limits the size of the program in memory to 640 kB.

    e.   is an arrangement permitting many users to be connected to a CPU   

          simultaneously

     

     

    12.

    FORTRAN:

     

    a.   is a programming language developed for scientific and mathematical applications.

    b.   combines machine portability with tight control and efficient use of computer resources.

    c.   can process large data files with alphanumeric characters.

    d.   is a programming language consisting of the ones and zeros of binary code.

    e.   is object-oriented.

     

     

    13.

    Software that functions as a translation layer between two disparate applications so they can work together is called:

     

    a.   integration software. 

    b.   groupware.

    c.   extensible software.

    d.   middleware.

    e.   translation software.

     

     

    14.

    A student, an order, and a book are all examples of a(n):

     

    a.   attribute.

    b.   key field.

    c.   field.

    d.   entity.

    e.   file.

     

     

    15.

    The older logical database model that is useful for depicting many-to-many relationships is the:

     

    a.   hierarchical DBMS.

    b.   SQL DBMS.

    c.   relational DBMS.

    d.   network DBMS.

    e.   object-oriented DBMS.

     

     

    16.

    Oracle Lite is a(n):

     

    a.   DBMS for small handheld computing devices.

    b.   Internet DBMS.

    c.   mainframe relational DBMS.

    d.   DBMS for midrange computers.

    e.   PC relational DBMS.

     

     

    17.

    The conceptual design of the database shows the database from a(n):

     

    a.   business perspective.

    b.   direct access perspective.

    c.   program perspective.

    d.   object-oriented perspective

    e.   management perspective.

     

     

    18.

    One advantage to a hypermedia database is that:

     

    a.   it is always stored on the Internet.

    b.   the nodes can be accessed in any order.

    c.   it is written in HTML.

    d.   it is much more easily understood by outside users.

    e.   it contains only one type of data.

     

     

    19.

    Using object-oriented extensions to existing relational DBMS is one way to create a(n):

     

    a.   system of easily accessible reports.

    b.   Internet warehouse.

    c.   data mart.

    d.   hybrid DBMS.

    e.   structured query language.

     

     

    20.

    Balancing the need to control mushrooming network costs and _______________ is a central management concern.

     

    a.   technology requirements

    b.   ensure network reliability and availability

    c.   developmental planning

    d.   user requirements

    e.   Internet capabilities

     

     

    21

    Analog signals are used to handle voice communications and:

     

    a.   channels.

    b.   graphics data.

    c.   large volumes of data quickly.

    d.   reflect variations in pitch.

    e.   light pulses.

     

     

    22.

    A smart phone is:

     

    a.   a   small,  pen-based,  handheld  computer  with  built-in  wireless telecommunications

    b.   a technology that enables two-way transmission of data files cheaply and efficiently.

    c.   a wireless phone with voice, text, and Internet capabilities.

    d.   a technology that uses lower power, higher frequency radio waves than cellular technology and so can be used with smaller sized telephones.

    e.   a device that transmits voice or data, using radio waves to communicate with radio antennas placed within adjacent geographic areas called cells.

     

     

    23.

    A front-end processor is a:

     

    a.   specialized computer that supervises communications traffic between the CPU and the peripheral devices in the telecommunications system.

    b.   device that carries the telecommunication message in analog form for packet distribution.

    c.   device that enables a single communications channel to carry data transmissions from multiple sources simultaneously.

    d.   special purpose computer dedicated to managing communications for the host computer in the network.

    e.   telecommunications computer that collects and temporarily stores messages from terminals for batch transmission to the host computer.

     

     

    24.

    A LAN:

     

    a.   is a central switching system that handles a firm’s voice and digital communications.

    b.   links all computers in a closed loop in a manner that passes data in one direction from one computer to another.

    c.   links all computers and other devices to a central host computer, through which all communications must pass.

    d.   connects computers and peripheral devices located close to each other, often in the same building.

    e.   links a number of computers by a single circuit with all messages broadcast to the entire network.

     

     

    25.

    Instruction delivered through purely digital technology is called:

     

    a.   e-learning.

    b.   asynchronous learning.

    c.   distance learning.

    d.   synchronous learning.

    e.   electronic data interchange.

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     (CHAPTER 9-12)

     

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

    1

    1.

     

     

     

     

     

     

     

     

    The new IT infrastructure provides a broad platform for electronic commerce, electronic business, and the emerging digital firm by:

     

    a.       using the Web as a base.

    b.      allowing open systems.

    c.       providing ISPs.

    d.      enabling companies to radically reduce their agency and transaction costs.

    e.       developing virtual private networks.               

     

     

    2.

     

     

    Open systems promote connectivity because:

     

    a.       they enable disparate systems and services to work together.

    b.      they transfer all packets indiscriminately, without the need for direction.

    c.       they do not require security.

    d.      they are easy to connect to each other.

    e.       they encrypt all files passing through the network.

     

     

    3.

     

     

    The Internet is perhaps the most well-known, and the largest, implementation of:

     

    a.       EDI.

    b.      anarchy within communications.

    c.       OSI.

    d.      cooperation between large business organizations.

    e.       internetworking.

     

     

    4.

     

    Personalized m-commerce services:

     

    a.       provide instant messaging, e-mail, searching for a movie or restaurant using a cell phone or handheld PDA.

    b.      search for the best price of an item using a cell phone and allow the user to buy it in a physical store or on the Web.

    c.       provide graphics and information on consumer items.

    d.      anticipate what you want based on your location or data profile.

    e.       charge an individual fee per transaction.

     

     

    5.

    .4.

     

    Intranets use ___________________ to program Web pages and to establish dynamic, point-and-click hypertext links to other pages.

     

    a.       a wireless web

    b.      WAP

    c.       HTML

    d.      multicasting

    e.       URLs

     

     

    6.

     

    An ISP is:

     

    a.       the address of a specific resource on the Internet.

    b.      an organization that sells temporary Internet connections to subscribers.

    c.       a markup language for wireless Web sites, optimized for tiny displays.

    d.      the conversion of domain names to their IP addresses.

    e.       a system of protocols and technologies that lets cell phones and other wireless devices with tiny displays, low-bandwidth connections, and minimal memory access Web-based information and services

     

     

    7.

     

     

    A DNS enables/is

     

    a.       the address of a specific resource on the Internet

    b.      an organization that sells temporary Internet connections to subscribers.

    c.       a markup language for wireless web sites, optimized for tiny displays.

    d.      the conversion of domain names to their IP addresses.

    e.       a system of protocols and technologies that lets cell phones and other wireless devices with tiny displays, lobe-bandwidth connections, and minimal memory access Web-based information and services

     

     

    8.

     

    Many AI applications improve performance through trial and error and:

     

    a.       can learn to think like a human being.

    b.      are not effective.

    c.       are too complicated to keep up.

    d.      these applications are called expert systems.

    e.       may not be reliable enough for mission-critical problems.

    9.

     

     

     

     

     

     

    Group collaboration systems:

     

    a.       share knowledge.

    b.      capture and codify knowledge.

    c.       schedule knowledge.

    d.      distribute knowledge.

    e.       create knowledge.

     

     

    10.

    1.       

    Those who primarily process create knowledge and information are called:

     

    a.       group collaborators.

    b.      knowledge workers.

    c.       information workers.

    d.      librarians.

    e.data workers.

     

     

    11.

    f.        

    CAD/CAM workstations:

     

    a.       provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.

    b.      provide an important source of expertise for organizations.

    c.       allow groups to work together on documents.

    d.      are used in the financial sector to analyze trading situations instantly.

    e.       provide architects, engineers, and medical workers with precise simulations of objects.

    g.       

     

    12.

    h.       

    LotusNotes and OpenText Livelink are examples of:

     

    a.            customized software.

    b.           VRML.

    c.            investment software.

    d.           Web tools. 

    e.            proprietary groupware.

    i.         

     

    13.

    j.         

    The terms used in fuzzy logic are called:

     

    a.          membership functions.

    b.          non-precise definitions.

    c.          oorts.

    d.         ranges.

    e.       eliminatory phrases.

    f.            

     

    14.

    g.           

    Even if a problem can be addressed by an information system, senior management:

     

    a.          may not be able to use one.

    b.          may not have a complete data warehouse.

    c.          may not be able to read the reports generated.

    d.         may not fully understand its actual information needs.

    e.          may decide that graphics are better.

    h.           

     

    15.

    i.             

    Model-driven DSS were often developed by:

     

    a.          senior managers in IS.

    b.          cross-divisional central management teams.

    c.          accident.

    d.         contracted consultants from outside the organization itself.

    e.    groups not under central information system control.

    a.           

     

    16.

    b.           

    Tools for voting or setting priorities in a GDSS:

     

    a.            facilitate the organized integration and synthesis of ideas generated during brainstorming. 

    b.           document group agreement on definitions of words and terms central to the projects.

    c.            use structured approaches to evaluate the impact of an emerging proposal on the organization.

    d.           aid the organizers in premeeting planning by identifying issues of concern.

    e.            Make available a range of methods for setting priorities or voting.

    c.           

     

    17.

    d.          

    Group interaction includes:

     

    a.            session planning, organizational memory, personal productivity, and enterprise analysis.

    b.           idea generation, complex problems, and large groups.

    c.            idea generation, idea organization, prioritizing, and policy development.

    d.           session planning, prioritizing, policy development, and organizational memory.

    e.            idea generation, personal productivity, enterprise analysis, and policy development.

    e.           

     

    18.

    f.            

    One problem with understanding the value of GDSS is their:

     

    a.                    availability and cost.

    b.                    complexity.

    c.                    need for organizational memory.

    d.                   need for a facilitator.

      e.           method of generating ideas.

    g.           

     

    19.

    h.           

    The components of the DSS are the:

     

    a.                    internal database, external database, and analysis tools.

    b.                    data visualization tools, software, and graphics capabilities.

    c.                    database, graphics capabilities, and analysis tools.

    d.                   analysis tools, software, and database.

                    e.         database, software system, and user interface.

    i.             

     

    20.

     

    When systems are used to strengthen the wrong business model or business processes,:

     

    a.                    the resulting information system is very difficult to analyze.

    b.                    the resulting system has no impact on the firm’s performance.

    c.                    the business becomes more efficient doing what it shouldn’t do.

    d.                   organizational change does not occur.

    e.             The cost increases geometrically.

    j.             

     

    21.

    k.           

     

    Two principal methodologies for establishing the essential information requirements of the organization as a whole are:

     

    a.                    personal interviews and critical success factors.

    b.                    enterprise analysis and systems analysis.

    c.                    object-oriented design and systems analysis.

    d.                   personal interviews and a review of historical data.

    e.                    enterprise analysis and critical success factors.

     

    22.

    l.             

    The most common form of IT-enabled organizational change is:

     

    a.                    rationalization of procedures.

    b.                    paradigm shifts.

    c.                    accessibility and empowerment.

    d.                   automation.

    e.                    business process reengineering.

    m.         

     

    23.

    n.           

    When the nature of the organization itself is radically reconceptualized, the result is:

     

    a.                    rationalization of procedures.

    b.                    paradigm shifts.

    c.                    accessibility and empowerment.

    d.                   automation.

      e.          business process reengineering.

    o.           

     

    24.

    p.           

    In terms of percentages, the maintenance phase devotes approximately _____ percent to changes in data, files, reports, hardware, or system software;

    a.              20

    b.             25

    c.              40

    d.             35

    e.              60

    q.           

     

    25.

    r.            

    WSDL:

     

    a.                    is a common framework for describing the tasks performed by a Web service so that it can be used by other applications.

    b.                    is a visually-oriented programming language.

    c.                    allows a Web service to be listed in the directory of Web services so that it can be easily located.

    d.                   is object-oriented and has open architecture.

    e.                    is a set of rules that allows applications to pass data and instructions to one another.

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     (CHAPTER 13-15)

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

    1.       

    The worth of systems from a financial perspective essentially revolves around the question of:

     

    a.   systems ownership.

    b.   information requirements.

    c.   multiyear financial models.

    d.   change management.

    e.   return on invested capital.

     

    2.       

    Transaction and clerical systems that displace labor and save space always produce more measurable, tangible benefits than management information systems, decision-support systems, or computer-supported collaborative work systems,:

     

    a.   which allow a broader context of business analysis.

    b.   which give financial models an application bias.

    c.   which require a lower rate of technological change.

    d.   which mean that intangibles can be given monetary value.

    e.   which have expected lives of many years.

     

    3.       

    The payback period in years is found by the formula:

     

    a.   (Total benefits – Total cost – Depreciation)/Useful life

    b.   Present value of cash inflows/Investment

    c.   Payment * (1 –(1 + interest)-n)/Interest

    d.   Net benefit/Total initial investment

    e.   Original investment/Annual net cash inflow

     

    4.       

    The present value is found by the formula:

     

    a.   (Total benefits – Total cost – Depreciation)/Useful life

    b.   Present value of cash inflows/Investment

    c.   Payment * (1 –(1 + interest)-n)/Interest

    d.   Net benefit/Total initial investment

    e.   Original investment/Annual net cash inflow = Number of years for repayment

     

    5.       

    A weakness of the net present value is that:

     

    a.   it provides no measure of profitability.

    b.   it cannot be used to rank several projects for comparison.

    c.   it ignores the disposal value of the computer systems.

    d.   it cannot calculate a profitability index.

    e.   it can ignore the time value of money.

     

    6.       

    The portfolio analysis:

     

    a.   uses capital budgeting analysis principles.

    b.   determines the overall direction of systems development.

    c.   is the agreement on the criteria used to make a choice amongst several different projects.

    d.   can be described as having a certain profile of risk and benefit to the firm.

    e.   is not used by firms in non-information-intensive industries.

     

    7.       

    If the budget is strained from the very beginning, toward the end of the project there will likely be insufficient funds for:

     

    a.   training and documentation.

    b.   timely completion and procedural planning.

    c.   the necessary hardware and software.

    d.   unplanned-for structural changes.

    e.   new employees to manage the new technologies.

     

    8.       

    Most applications are designed, planned, and created by persons:

     

    a.   who do not understand the company substructure.

    b.   with no prior experience in the application area.

    c.   who are not stakeholders.

    d.   who are employed for the development of only that system.

    e.   who are managers, not end users.

     

    9.       

    Traditionally, the area of _____________________ has been neglected in systems design and analysis activities.

     

    a.   end-user training

    b.   organizational impact analysis

    c.   change management

    d.   power relationships within the organization

    e.   procedural documentation

     

    10.   

    Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:

     

    a.   are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.

    b.   are not secure because the technology to secure them did not exist at the time the files were created.

    c.   have the potential to be accessed by large numbers of people and by groups outside of the organization.

    d.   are frequently available on the Internet.

    e.   are written in obsolete programming languages.

     

    11.   

    Code Red and Nimda are:

     

    a.   viruses written in script programming languages that use Microsoft Outlook to spread to other systems.

    b.   “worm” type viruses that arrive attached to e-mail and spread from computer to computer.

    c.   “multipartite” viruses that can infect files as well as the boot sector of the hard drive.

    d.   viruses that make a clicking sound with each keystroke on the 18th day of the month.

    e.   macro viruses existing inside executable programs called macros.

     

    12.   

    The most expensive phase of the system development process is:

     

    a.   end-user training.

    b.   implementation.

    c.   testing.

    d.   maintenance.

    e.   systems design.

     

    13.   

    General controls:

     

    a.   are unique to each computer program.

    b.   ensure that data files on either disk or tape are not subject to unauthorized access, change, or destruction.

    c.   establish a framework for controlling the design, security, and use of computer programs throughout the organization.

    d.   audit the systems development process.

    e.   are formalized standards, rules, procedures, and disciplines that ensure that the organization’s controls are properly executed and enforced.

     

    14.   

    Hardware controls:

     

    a.   oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

    b.   ensure that computer hardware is physically secure and check for equipment malfunction.

    c.   audit the systems development process at various points to ensure that the processes are properly controlled and managed.

    d.   monitor the use of system software and prevent unauthorized access to software programs, systems software and computer programs.

    e.   ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

     

    15.   

    Software controls:

     

    a.   oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

    b.   ensure that computer hardware is physically secure and check for equipment malfunction.

    c.   audit the systems development process at various points to ensure that the processes are properly controlled and managed.

    d.   monitor the use of system software and prevent unauthorized access to software programs, systems software and computer programs.

    e.   ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

     

     

    16.   

    In a risk assessment, multiplying the average loss for each exposure by its probability of occurrence gives the:

     

    a.   loss range.

    b.   annual loss.

    c.   prediction of vulnerability.

    d.   threat ranking.

    e.   exposure capability.

     

    17.   

    A selection construct is:

     

    a.   the single step or action in the logic of a program that does not depend on the existence of any condition.

    b.   a logical unit of a program that performs one or several functions.

    c.   the logic pattern in programming where a stated condition determines which of two alternative actions can be taken.

    d.   the basic control structure that has only one entry point and one exit point.

    e.   the logic pattern in programming where certain actions are repeated until a specified condition occurs or until certain conditions are met.

     

    18.   

    The sequence construct is:

     

    a.   the single step or action in the logic of a program that does not depend on the existence of any condition.

    b.   a logical unit of a program that performs one or several functions.

    c.   the logic pattern in programming where a stated condition determines which of two alternative actions can be taken.

    d.   the basic control structure that has only one entry point and one exit point.

    e.   the logic pattern in programming where certain actions are repeated until a specified condition occurs or until certain conditions are met.

     

    19.   

    In moving to a global business, the challenge for management is to:

     

    a.   standardize global systems, and consolidate reporting.

    b.   create SAP enterprise software and a frame relay network.

    c.   facilitate global operations, and reduce costs.

    d.   set standards, and develop global business processes.

    e.   maintain global headquarters, business processes, and subsidiaries.

     

    20.   

    Two powerful worldwide changes driven by advances in information technology that have transformed the business environment and post new challenges for management are:

     

    a.   the creation of the NASA satellite system.

    b.   the transformation of industrial economies to knowledge-and information-based economies.

    c.   the emergence of the global economy and a global world order.

    d.   b and c only

    e.   a, b and c

     

    21.   

    In terms of global business strategy and structure, a transnational company will use a policy of:

     

    a.   mixed sales and marketing, with centralized production, accounting, human resources, and strategic management.

    b.   coordinated production, accounting, marketing, human resources, and strategic management.

    c.   coordinated production, accounting, human resources, with centralized strategic management, and marketing.

    d.   dispersed production and marketing, with centralized accounting, human resources and strategic management.

    e.   coordinated production, marketing, human resources, and strategic management, with dispersed production.

     

    22.   

    Decentralized systems are those in which:

     

    a.   development occurs at the home base and operations are handed over to autonomous units in foreign locations.

    b.   each foreign unit designs its own unique solutions and systems.

    c.   systems development and operations occur in an integrated and coordinated fashion across all units.

    d.   foreign units design the solutions and systems that are used at the domestic home base.

    e.   systems development and operations occur totally at the domestic home base.

     

    23.   

    Two of the management challenges in developing global systems are listed in your text as:

     

    a.   managing the privacy concerns of different countries and coordinating applications development.

    b.   creating a financial structure that will operate internationally and managing the privacy concerns of different countries.

    c.   subordination of software releases and managing the privacy concerns of different countries.

    d.   the coordination of software releases and the introduction of changes in business processes.

    e.   encouraging local users to support global systems and creating a financial structure that will operate internationally

     

    24.   

    For most people in developing countries, Internet access is:

     

    a.   easier than telephone access.

    b.   inexpensive.

    c.   very expensive.

    d.   essential.

    e.   through cable TV connections.

     

    25.   

    VPNs:

     

    a.   may not be able to support large numbers of remote users.

    b.   use private, leased telephone lines or frame-relay connections.

    c.   do not always have sufficient security for international services.

    d.   replace WANs for most international or global companies.

    e.   are not legal in many countries.

     

     


    0 comments:

    Post a Comment

     
    Top