Thursday, 21 November 2013

Tourist Destination: Planning and Development

Contributions of destination of development models to destination planning

            Tourism is one of the recreational practices an individual undertakes. People who exercise tourism are called tourists. According to  (2005) due to the fact that tourism is now one of the most popular recreational activity of people all over the world, in the year 2004 around 763 million tourists arrive in various parts of the world. Tourism plays a vital and crucial role in the economy of any country because the income and profit that is being obtained by the utilisation of products and services of the tourists will generate taxes which can be levied to the government. In addition, tourism provides employment and aids in the development of the economy of the nation. According to  (2000) tourism is not just a recreational and decorative activity but instead tourism correlates centrally to the modernity in numerous dimensions such as politics, moral, economical and technological.

            This paper examines the various models of development destination. Models such as the Tourist Area Life Cycle, Resort Development Spectrum, and Touristisation model will be discussed. In addition the strengths and weaknesses of the three models will also be discussed in this paper. In the Tourist Area Life Cycle (TALC) Model the stages will be examined. The TALC model will be illustrated using the Danxia Mountain in People’s Republic of China wherein the development stages are highlighted. The measures that the tourism authority has taken up in the product re-organisation, transformation, rejuvenation, and specialisation of the Danxia Mountain in People’s Republic of China will also be discussed. Finally, a conclusion will be made at the end of this paper.

            Hong Kong is one of the most popular destinations in the world and the tourism industry is one of the most important aspects in the economy of Hong Kong.  According to the  (2007) the industry held another record last 2006 in which more than 25 million tourists arrived in Hong Kong. In order to maintain the number of tourist arrivals in Hong Kong, the tourism department plans, develops, and audits the possible competitive destination. Tourism planning, according to  (1985) is the procedure which is concerned with expecting and regulating the transformation in the system in order to enhance the methodical development benefits from the society, economy, and the environment. In planning, especially, in the industry such as tourism the stakeholder plays an important role. A stakeholder is an individual or group of individuals that is changed negatively by the causes and the consequences of the issues and decisions (1992). 

            According to (2002) there are two approaches in tourism destination planning and these are project planning approach and organic planning approach. In project planning approach the steps include determining the sponsorship of the projects, and also the leaders behind it. The tourism authority must set goals that must be attained within the timeframe. Examine systematically the strengths and weaknesses of the planned project. Determine the purpose of the project and identify the best strategy to utilise. Designate the priorities and responsibilities of the individuals involved in the project. Excite the people involved and guide the development of the plan, and then monitor the development and review the feedback Organic planning process on the other hand includes the following steps the determination of the problem and opportunities within the planned project, establishment of goals that must be attainable, analysis of the area of the project, as well as, the entire location of the project, detailed studies on the project and are, planning the concepts of the business, as well as, the options involved, development of the guidelines, creating detailed designs of the project, implementation of the designs and the project, and management and evaluation of the project.

            In developing the destinations in any country a destination development model is important. There are three types of destination development models and these are the Tourist Area Life Cycle, the Resort Development Model, and the Touristization Model.

Resort Development Spectrum- according to  (2000) it is a destination development model wherein the tourist destination is usually a commercial area wherein the products and the services are produced and sold to the tourists. These commercial facilities entice the existing and new markets in which it develops new products and facilities.

            In addition, according to Predeaux the capacity of a tourist destination to expand will be determined by the infrastructure of the area if the infrastructure is poor then most probably there would be fewer financiers that will invest in the area, transport is another aspect in expansion, if the area is not accessible to transportation, inviting investors to expand will be hard, ecological constraints such as storms and earthquakes could also hamper the expansion of the tourist destination, the physical constraints such as the political stability in the area, and the attractiveness of the resources, if the destination could be an attractive destination especially for investors, then there is a probability that they would invest in order to expand the area.

            Resort Development Spectrum has its own share of strengths and weaknesses. According to  (2003) the advantage of the resort development spectrum model is that it is multidimensional and based on an understanding of the demand-side response to the market that operates in resorts and integrates the elements of Fordist and post- Fordist interpretation of the production and demand. Moreover, the model can be a possible candidate for planning tool in predicting the patterns of resort development in the future. However, there are disadvantages of the model, according  (2004) the disadvantages of disadvantages and limitations of the model are over-commercialization and a poor image most resorts or tourist destinations are overly commercialised and tends to be over-crowded which can lead to a negative perception of the place by the existing and possible tourists, another is the deterioration of the physical environment due to mass tourism. It includes the loss of the natural habitats of the plants and animals and increase in air, water, and noise pollution and even damage to the historic places, and then the lack of investment because of over-dependence of the package holiday which is characterised by high volume and low yield.  

Touristisation Model- according to  (1983) this destination development model focuses on developing the rural area for tourism. Young enumerated the stages in the touristisation model and these are:

  • Early traditional
  • Late traditional
  • Initial tourism in which the rural areas are explored to determine potential tourist destinations.
  • Early tourism in this stage the government as well as the government and private sectors are involved in planning and developing the destination.
  • Expanding tourism in this stage the plans are created and put into action.
  • Consolidation stage in which all of the development projects and ideas are united.

Touristization model juts like other destination development models have strengths and weaknesses. One of the strength of the model is that it helps the people, particularly of low-income status living in a possible tourist destination to gain extra income. Areas that are good locations for tourist destination can be developed in order to attract possible tourists in the area. However, the model has its share of disadvantages; according to  (2003) utilisation of touristisation model will slowly lose the identity of the place, in traditional societies the quick leap from the traditional way of earning to a faster one through tourism seemed to be immoral and almost indecent. In addition, the changes that occur in traditional villages would relate directly to the differences in the aesthetic, ethical and economic values between those proposing the tourism development and the people that want to retain their traditional way of living. In addition, the economic advantages relies upon the people living in the area whether they will accept the drastic changes in their way of living, culture and even personal identities.

Tourist Area Life Cycle- according to (1980) this destination development model is utilised for the evolution of a destination. In addition, Butler (2006) TALC model has proven to be an important aspect in articulating the evolution of the area for tourism, at the same time, verifying the imitation of the predictable pattern of the stages of the lifecycle such as introduction, expansion, consolidation, and contraction which is related to all types of organisation may it be biological, genetic, cognitive, cultural ecological, or economic.

            From the three destination development model, the most preferred especially by developed nations is the Tourist Area Life Cycle, due to the fact that the model goes with the flow in the changes and preferences of the customers. Tourism is also a business, and businesses constantly evolved in order to keep up with the trends and the competition with others. Although Tourism Area Life Cycle is often favoured by a number of sectors in the society particularly the tourism government authorities, there are still disadvantages of the said model. According to  TALC Model has its strengths, and one of those is it is useful in interpreting and explaining the past and can be utilised as one of the prime attractions in the tourist destinations. In addition, in the context of fully-developed destinations the TALC model could be utilised in a strategic manner to instigate action to prevent the decline. Moreover, strength of the model according to  (2006) is that it is a useful tool for understanding the development patterns of mass tourism destinations.  The disadvantages of the model were discussed by some critics of the model and one of those is Agarwal (1994) he discussed that the model should have alternative and additional stages after the stagnation stage of the original model. In addition, according to Baum the original TALC Model does not acknowledge the probability of having further stages which could take place as associated alternatives to either decline or rejuvenation. Another limitation of the model, according to Morais et al is that the TALC Model is not applicable model of tourism particularly in the developing world wherein the appropriate model is the ethnic tourism.

            The stages in the Tourist Area Life Cycle, according to Prideaux are the following:

  • Exploration- an area usually not yet developed is explored in order to determine if it has the potential of being a tourist destination. The task force hired by the tourism authority and the consultants are the individuals involved in the exploration of new places.
  • Involvement- once the place is explored and has been considered as a possible tourist destination, the relevant individuals and group of individuals are going to discuss about the development plans in the area, concerns such as in the environment will be tackled. 
  • Development- once the key organisations and individuals have finished discussing and have come in to terms then the development of the project will begin.
  • Consolidation- the elements that are important in developing a new tourist destination are merged in order to perform a related function. Example while the area is being developed, the government as well as the owners of the businesses in the area will promote the destination to attract more consumers. 
  • Stagnation- it is the period when the tourist destination has little or nor growth at all. Stagnation usually happens if a problem occurred such as damaged of property due to calamities like earthquakes and storms, or even outbreak of a disease such as SARS. The income generated from the tourist destination declines during this particular stage.
  • Decline to Rejuvenation- if the tourism authority, as well as, the owners are keen in gaining more profit they would look for ways to restore the vitality and vibrancy of the tourist destination. An example is during the SARS outbreak in Hong Kong wherein the tourism industry was greatly affected and a number of tourists have withdrawn their visits, however after that stagnation Hong Kong was able to recuperate from the financial losses and once again became one of the premier destinations in Asia. 

According to  () tourism area life cycle model is simple, plausible, and obtains interesting outcomes, it is the first analytical framework that incorporates the features of demand and supply of the customers.

The Application of Tourist Life Cycle Model in Danxia Mountain

            According to Danxia Mountain is one of the most famous geological parks in the People’s Republic of China and it is located in the northern part of the Guangdong Province. The area is approximately 180 square kilometres. The usual features of the mountain are its red hills and stones.

Exploration- the place has not been explored by the tourism authority for numerous years. The tourism authority was able to examine the area and determine possible tourist attractions which are the temples in Guangdong that were built 1200 years ago. 

Involvement- upon determining that the area could be a possible tourist attraction the group of individuals that were involved created plans to develop the area. The development of a new attraction was discussed and around 3.5 square kilometres of Danxia Mountain was opened for tourists.

Development- even though it is not a major attraction, a number of people have visits Danxia Mountain already, however the development of the mountain began in 1970s; this is he development stage of the Mountain.

Consolidation- Danxia Mountain was successful in attracting tourists, and it became an important pilgrimage destination for the Buddhists, at the same time, the area became popular for its scenic view of the sunrise, as well as, the sights that the mountain beholds.

Stagnation- however the tourist arrivals in Danxia Mountain have declined due to mismanagement and a tougher competition from other resorts in China, as well as, in Asia. The number of tourists became stagnant until the tourists that visits the place declined. The tourism authority still made efforts to promote the destination, but still it was not enough to lure the visitors.

Decline to Rejuvenation- the tourist influx in Danxi Mountain has immensely decreased despite of the efforts made by various sectors in the industry. In order to revive the splendour of the Danxia Mountain Prof.  was invited to work in reviving the mountain. The main reason for the decline of tourist arrivals was the poor management of the area, and in order to solve that problem the image of Danxia Mountain will be enhanced and the resort will open new attractions. After careful deliberation on the situation, the team of Prof. Bao selected YangYuan Stone as the main feature of the resort, aside from the new attractions it offered. And in the year 1995 the Danxia Mountain received tourists again and the outcome has been positive because the arrivals have been increasing since it opened again.  

            In addition, according to Butler the first application of the Tourist Life Cycle Model in China was in Danxia Mountain in 1993, wherein Professor Jigang Bao found out that the mountain was in its Stagnation Stage and the best way to attract new tourists is to develop new tourist attractions, and after deliberating the factors associated with developing new attractions the Yangyuan Stone Scenic Spot was selected as the new attraction afterwards it was developed. Danxia Mountain was quickly rejuvenated after selecting and adding new tourist spots in the area.

            The successful utilisation of the Tourist Area Life Cycle model in the planning and developing of Danxia Mountain exhibited that the appropriate analysis of the area could determine the proper ways in rejuvenating and reviving the tourist destination.

Conclusion

            Tourism is one of the pillars in the economy of Hong Kong and it is an important source of income for the nation. Hong Kong has already faced a number of challenges in their tourism industry; it has experienced ups and downs due to a number of reasons. But despite of those, Hong Kong remained one of the premier tourist destinations not just in the Asia Pacific Region but in the whole world as well. In order to keep and even increase the amount of tourist arrivals in the nation, the tourism authority of Hong Kong must utilised various forms of destination development, they can use any of the three models to promote and maintain the tourist destinations. In order to ensure that the developments of new destinations, as well as the existing destinations are tourist and investor friendly, the tourism authority should monitor the new developments in the area. Aside from monitoring the developments in the tourist destinations, the authorities, as well as, the people involved such as the investors and the public should identify the measures that would improve the situation, and alleviate the problems even if it is small. Through this, the authorities could be able to prevent the catastrophes from emerging. TALC model is the first tourism framework developed and aside from the fact that it is a model for destination development it could also be utilised in monitoring the evolution of the area, TALC could be able to determine whether the area is already stagnant and authorities will be able to prevent the decline of the area. TALC is also an appropriate tool for longer tourism plans because the stages are created for a longer span of time. The authorities could already visualise future problems and they could create risk measures to counter those probable problems.

Multiple choice for Management Information Systems

(CHAPTER 1-4)

MANAGEMENT INFORMATION SYSTEMS

 

 

 

INSTRUCTIONS TO THE CANDIDATES:

 

Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

 

 

1.

Information is:

 

a.        the accumulation of raw data.

b.        the way we analyze problems.

c.        the best form of knowledge.

d.       Data shaped into meaningful form.

e.        Output that is returned to appropriate members of the organization, which allows them to correct future input.

 

 

 

 

2.

_______________________ systems depend on fixed definitions of data and procedures form collecting, storing disseminating, and using the data.

 

a.       Informal

b.      Modern

c.       Traditional

d.      Formal

e.       Bureaucratic   

 

 

 

 

3.

Promoting the organization’s products and services is a business function of

 

a.       manufacturing and production

b.      finance

c.       human resources

d.      sales and marketing

e.       accounting

 

 

 

 

 

 

4.

Information systems are _______________________ systems.

 

a.       behavioral

b.      sociotechnical

c.       technical

d.      optimizing

e.       efficient

 

 

 

 

5.

E-commerce and the use of Internet technology are driving the move toward:

 

a.       new tax laws.

b.      fiber-optic networks worldwide.

c.       multinational organizations.

d.      satellite communications systems.

e.       digital firms.

 

 

 

 

6.

The power of computer hardware and software has grown much more rapidly than:

 

a.       the ability of organizations to purchase the technology

b.      the ability of organizations to apply and use the technology

c.       worldwide internet usage

d.      governments can control

e.       telecommunications technologies

 

 

 

 

7.

Information systems are an outcome of culture, politics, work flows, standard operating procedures and.

 

a.       computer professionals.

b.      organizational structure

c.       economic need.

d.      the internet

e.       telecommunications requirements

 

 

 

 

8.

Integrating systems for different organizational levels and functions to freely exchange information:

 

a.       is not a requirement of the digital firm.

b.      will require the use of the mainframe system.

c.       can be technologically difficult and costly.

d.      has always been part of bureaucratic policy.

e.       does not require the managers be retrained.

 

 

 

 

 

 

 

 

9.

Market research and pricing are functions of

 

a.       finance/accounting systems.

b.      human resources systems

c.       manufacturing/production systems

d.      sales marketing systems

e.       decision support systems

 

 

 

 

10.

The interaction between information technology and organizations is very complex and is influenced by a great many mediating factors, including the organization structure, standard operating procedures, politics, culture, management decisions and:

 

a.       the surrounding environment.

b.      the economic basis of the company

c.       the availability of trained employers

d.      the cash flow within the company

e.       the microeconomic definition of the specific organization

 

 

 

 

11.

One reason Detroit automakers have between slow to adopt Japanese mass-production method is that:

 

  • they cannot change the design of their manufacturing plants.

  • they have difficulty in changing standard operating procedures.

  • U.S workers are much more highly paid

  • U.S workers do not adapt well to the Japanese procedures.

  • such changes have not been necessary.

  •  

     

     

     

    12.

    One way in which the organization affects information technology is through the decisions that it makes about:

     

    a.       how often equipment will be replaced.

    b.      whether computer expenditures are considered to be capital expenditures, or not.

    c.       who will design, build, and maintain the organization’s IT infrastructure.

    d.      how much influence company culture will have on technological decisions.

    e.       the formal organizational unit or function responsible for technology services.

     

     

     

     

    13.

    In the early years, the information systems group was composed mostly of:

     

    a.       systems analysts.

    b.      mid-level managers.

    c.       end users.

    d.      clerical workers.

    e.       programmers.

     

     

     

     

     

     

    14.

    According to the Mintzberg model of management, decisional roles are:

     

    a.       where managers initiate activities, handle disturbances, allocate resources, and negotiate conflict.

    b.      where managers act as figureheads and leaders for the organization. 

    c.       where managers act as a liaison, disseminating and allocating resources.

    d.      the expectations of the activities that managers should perform in an organization.

    e.       where managers act as the nerve centers of their organizations, receiving and disseminating critical facts.

     

     

     

     

    15.

    The ______________________ model is the model used to describe the interaction of external influences, specifically threats and opportunities, that affect an organization’s strategy and ability to compete.

     

    a.       network economics

    b.      competitive forces

    c.       strategic transitions

    d.      environmental conditions

    e.       interactive economics

     

     

     

     

    16.

     

     

    Digital firms require:

     

    a.       massive computer capacities.

    b.      deep pockets.

    c.       new organizational designs and management processes.

    d.      exceptionally flexible transaction processing systems.

    e.       networks that bypass traditional distribution channels.

     

     

     

     

    17.

    New levels of richness and reach are enabled on the Internet by  _____________

     

    a.       the explosion of connectivity.

    b.      easier coordination of function.

    c.       the dissemination of standards.

    d.      a and c

    e.       b and c

     

     

     

     

    18.

    Yahoo! is an example of:

     

    a.       a search engine.

    b.      a portal.

    c.       a Web browser.

    d.      a syndicator.

    e.       a directory.

     

     

     

     

     

     

     

     

     

    19.

    Members of the organization use intranets to create:

     

    a.       a collaborative environment.

    b.      new services for customers.

    c.       a supply chain.

    d.      an organization requiring fewer middle managers.

    e.       better operations control.

     

     

     

     

    20.

    Companies pursuing electronic commerce must be especially vigilant about:

     

    a.       maintaining updated transaction files.

    b.      establishing a well-designed Web site.

    c.       maintaining a shopping cart and online credit transactions.

    d.      establishing trust, security, and consumer privacy.

    e.       constantly updating their business plan.

     

     

     

     

    21.

    An example of Web-based supply chain management is:

     

    a.       the use of intranet collaboration tools for contact management, discussion forums, document management, and calendars.

    b.      the ability to monitor un-invoiced income or outstanding debt each day.

    c.       the provision of data on quality measurements, such as defects and rejects, as well as maintenance and training schedules.

    d.      allowing employees to manage their own health and pension benefits accounts.

    e.       using a Web-based forecast to maximize the profitability of shelf space for the company’s products.

     

    22

    Internet-based systems are more vulnerable to penetration by outsiders than private networks because:

     

    a.   so many people see each message.

    b.   most Internet companies do not have adequate firewalls.

    c.   the Internet was designed as an open environment.

    d.   a computer in the home environment is insecure.

    e.   it is international.

     

     

    23

    Manufacturing and production data from disparate systems can coordinate manufacturing and production processes using the common platform created by:

     

    a.   Internet technology.

    b.   supply chain logistics.

    c.   extranets.

    d.   intranets.

    e.   telecommunications systems.

     

     

     

    24

    The _________________________ environment for electronic commerce has not been fully established.

     

    a.   linguistic

    b.   coding

    c.   satellite

    d.   legal and regulatory

    e.   administrative and merchandising

     

     

     

     

     

     

     

    25

    Many virtual storefront organizations do not provide finances in the business plan to provide for:

     

    a.   new telecommunications lines.

    b.   additional shipping expenses and skilled Web staff.

    c.   the necessary software.

    d.   the unexpected increase in orders.

    e.   the consulting expenses connected with an ISP.

     

     

     

     

     


     

    (CHAPTER 5-8)

    MANAGEMENT INFORMATION SYSTEMS

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

     

    1.

    Information technology and information systems raise new ethical questions for both individuals and societies because:

     

    a.   they are global in their effects.

    b.   they are difficult for governments to regulate.

    c.   so few people understand them.

    d.   they create opportunities for intense social change.

    e.   they change so quickly.

     

     

    2.

    Many Web sites allow the Internet advertising broker DoubleClick to:

     

    a.   gather cookies from their site in return for advertisements on other sites based on the visitor profile created.

    b.   access their sales figures.

    c.   mine large pools of data they have collected in their business endeavors.

    d.   place advertisements for other organizations on their Web site.

    e.   track the activities of their visitors in exchange for revenue from advertisements based on visitor information.

     

     

    3.

    The Federal Trade Commission Fair Information Practice principle of Access/Participation states that:

     

    a.   customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction, including internal use and transfer to third parties.

    b.   data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use.

    c.   there is a mechanism in place to enforce FIP principles.

    d.   Web sites must disclose their information practices before collecting data.

    e.   consumers should be able to review and contest the accuracy and completeness of data collected about them in a timely, inexpensive process.

     

     

    4.

    Cookies are stored:

     

    a.   on the user’s hard drive.

    b.   on the Web site.

    c.   in a temporary file in the memory of the user’s computer.

    d.   at the ISP.

    e.   on the browser.

     

     

    5.

    The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain:

     

    a.   when the courts become involved.

    b.   when hackers are able to break into the source code.

    c.   when the software is widely distributed.

    d.   when a new version of the software is released.

    e.   because there are no sanctions on copying software.

     

     

    6.

    In general, it is very difficult to hold software producers liable for their software products when those products are considered to be:

     

    a.   digital shareware.

    b.   common carriers.

    c.   services.

    d.   non-essential systems.

    e.   like books.

     

     

    7.

    Information, knowledge, computers, and access to these resources through educational institutions in public libraries are inequitably distributed:

     

    a.   because of industrial competition.

    b.   along ethnic and social class lines.

    c.   only in the United States.

    d.   in every country but the United States.

    e.   because it is difficult to learn to use software.

     

     

    8.

    A microsecond is:

     

    a.   1/1,000 second.

    b.   1/1,000,000 second.

    c.   1/10,000,000 second.

    d.   1/1,000,000,000 second.

    e.   1/1,000,000,000,000 second.

     

     

    9.

    Batch processing is a method of collecting and processing data in which transactions:

     

    a.   are accomplished by one large central computer.

    b.   are accumulated and stored until a specified time when it is convenient or necessary to process them as a group.

    c.   are entered directly into the computer system and processed immediately.

    d.   are processed among multiple computers linked by communications network.

    e.   are technologies for transferring audio and video data to be processed as a steady and continuous stream as they are downloaded from the Web.

     

     

    10.

    The interface component in client/server computing is:

     

    a.   the way in which the various applications connect with each other.

    b.   a feature of thin client computing.

    c.   necessary only if a mainframe is involved.

    d.   how the application appears visually to the user.

    e.   shaped by the organization’s business rules.

     

     

    11.

    Virtual storage:

     

    a.   allows many programs to share a computer system’s resources at any one time through concurrent use of the CPU.

    b.   links together two or more CPUs to work in parallel in a single computer system.

    c.   handles programs more efficiently by breaking down the programs into tiny sections that are ready to use memory only when needed.

    d.   limits the size of the program in memory to 640 kB.

    e.   is an arrangement permitting many users to be connected to a CPU   

          simultaneously

     

     

    12.

    FORTRAN:

     

    a.   is a programming language developed for scientific and mathematical applications.

    b.   combines machine portability with tight control and efficient use of computer resources.

    c.   can process large data files with alphanumeric characters.

    d.   is a programming language consisting of the ones and zeros of binary code.

    e.   is object-oriented.

     

     

    13.

    Software that functions as a translation layer between two disparate applications so they can work together is called:

     

    a.   integration software. 

    b.   groupware.

    c.   extensible software.

    d.   middleware.

    e.   translation software.

     

     

    14.

    A student, an order, and a book are all examples of a(n):

     

    a.   attribute.

    b.   key field.

    c.   field.

    d.   entity.

    e.   file.

     

     

    15.

    The older logical database model that is useful for depicting many-to-many relationships is the:

     

    a.   hierarchical DBMS.

    b.   SQL DBMS.

    c.   relational DBMS.

    d.   network DBMS.

    e.   object-oriented DBMS.

     

     

    16.

    Oracle Lite is a(n):

     

    a.   DBMS for small handheld computing devices.

    b.   Internet DBMS.

    c.   mainframe relational DBMS.

    d.   DBMS for midrange computers.

    e.   PC relational DBMS.

     

     

    17.

    The conceptual design of the database shows the database from a(n):

     

    a.   business perspective.

    b.   direct access perspective.

    c.   program perspective.

    d.   object-oriented perspective

    e.   management perspective.

     

     

    18.

    One advantage to a hypermedia database is that:

     

    a.   it is always stored on the Internet.

    b.   the nodes can be accessed in any order.

    c.   it is written in HTML.

    d.   it is much more easily understood by outside users.

    e.   it contains only one type of data.

     

     

    19.

    Using object-oriented extensions to existing relational DBMS is one way to create a(n):

     

    a.   system of easily accessible reports.

    b.   Internet warehouse.

    c.   data mart.

    d.   hybrid DBMS.

    e.   structured query language.

     

     

    20.

    Balancing the need to control mushrooming network costs and _______________ is a central management concern.

     

    a.   technology requirements

    b.   ensure network reliability and availability

    c.   developmental planning

    d.   user requirements

    e.   Internet capabilities

     

     

    21

    Analog signals are used to handle voice communications and:

     

    a.   channels.

    b.   graphics data.

    c.   large volumes of data quickly.

    d.   reflect variations in pitch.

    e.   light pulses.

     

     

    22.

    A smart phone is:

     

    a.   a   small,  pen-based,  handheld  computer  with  built-in  wireless telecommunications

    b.   a technology that enables two-way transmission of data files cheaply and efficiently.

    c.   a wireless phone with voice, text, and Internet capabilities.

    d.   a technology that uses lower power, higher frequency radio waves than cellular technology and so can be used with smaller sized telephones.

    e.   a device that transmits voice or data, using radio waves to communicate with radio antennas placed within adjacent geographic areas called cells.

     

     

    23.

    A front-end processor is a:

     

    a.   specialized computer that supervises communications traffic between the CPU and the peripheral devices in the telecommunications system.

    b.   device that carries the telecommunication message in analog form for packet distribution.

    c.   device that enables a single communications channel to carry data transmissions from multiple sources simultaneously.

    d.   special purpose computer dedicated to managing communications for the host computer in the network.

    e.   telecommunications computer that collects and temporarily stores messages from terminals for batch transmission to the host computer.

     

     

    24.

    A LAN:

     

    a.   is a central switching system that handles a firm’s voice and digital communications.

    b.   links all computers in a closed loop in a manner that passes data in one direction from one computer to another.

    c.   links all computers and other devices to a central host computer, through which all communications must pass.

    d.   connects computers and peripheral devices located close to each other, often in the same building.

    e.   links a number of computers by a single circuit with all messages broadcast to the entire network.

     

     

    25.

    Instruction delivered through purely digital technology is called:

     

    a.   e-learning.

    b.   asynchronous learning.

    c.   distance learning.

    d.   synchronous learning.

    e.   electronic data interchange.

     

     

     

     

     

     

     

     

     

     

     

     

     

     

     (CHAPTER 9-12)

     

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

    1

    1.

     

     

     

     

     

     

     

     

    The new IT infrastructure provides a broad platform for electronic commerce, electronic business, and the emerging digital firm by:

     

    a.       using the Web as a base.

    b.      allowing open systems.

    c.       providing ISPs.

    d.      enabling companies to radically reduce their agency and transaction costs.

    e.       developing virtual private networks.               

     

     

    2.

     

     

    Open systems promote connectivity because:

     

    a.       they enable disparate systems and services to work together.

    b.      they transfer all packets indiscriminately, without the need for direction.

    c.       they do not require security.

    d.      they are easy to connect to each other.

    e.       they encrypt all files passing through the network.

     

     

    3.

     

     

    The Internet is perhaps the most well-known, and the largest, implementation of:

     

    a.       EDI.

    b.      anarchy within communications.

    c.       OSI.

    d.      cooperation between large business organizations.

    e.       internetworking.

     

     

    4.

     

    Personalized m-commerce services:

     

    a.       provide instant messaging, e-mail, searching for a movie or restaurant using a cell phone or handheld PDA.

    b.      search for the best price of an item using a cell phone and allow the user to buy it in a physical store or on the Web.

    c.       provide graphics and information on consumer items.

    d.      anticipate what you want based on your location or data profile.

    e.       charge an individual fee per transaction.

     

     

    5.

    .4.

     

    Intranets use ___________________ to program Web pages and to establish dynamic, point-and-click hypertext links to other pages.

     

    a.       a wireless web

    b.      WAP

    c.       HTML

    d.      multicasting

    e.       URLs

     

     

    6.

     

    An ISP is:

     

    a.       the address of a specific resource on the Internet.

    b.      an organization that sells temporary Internet connections to subscribers.

    c.       a markup language for wireless Web sites, optimized for tiny displays.

    d.      the conversion of domain names to their IP addresses.

    e.       a system of protocols and technologies that lets cell phones and other wireless devices with tiny displays, low-bandwidth connections, and minimal memory access Web-based information and services

     

     

    7.

     

     

    A DNS enables/is

     

    a.       the address of a specific resource on the Internet

    b.      an organization that sells temporary Internet connections to subscribers.

    c.       a markup language for wireless web sites, optimized for tiny displays.

    d.      the conversion of domain names to their IP addresses.

    e.       a system of protocols and technologies that lets cell phones and other wireless devices with tiny displays, lobe-bandwidth connections, and minimal memory access Web-based information and services

     

     

    8.

     

    Many AI applications improve performance through trial and error and:

     

    a.       can learn to think like a human being.

    b.      are not effective.

    c.       are too complicated to keep up.

    d.      these applications are called expert systems.

    e.       may not be reliable enough for mission-critical problems.

    9.

     

     

     

     

     

     

    Group collaboration systems:

     

    a.       share knowledge.

    b.      capture and codify knowledge.

    c.       schedule knowledge.

    d.      distribute knowledge.

    e.       create knowledge.

     

     

    10.

    1.       

    Those who primarily process create knowledge and information are called:

     

    a.       group collaborators.

    b.      knowledge workers.

    c.       information workers.

    d.      librarians.

    e.data workers.

     

     

    11.

    f.        

    CAD/CAM workstations:

     

    a.       provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.

    b.      provide an important source of expertise for organizations.

    c.       allow groups to work together on documents.

    d.      are used in the financial sector to analyze trading situations instantly.

    e.       provide architects, engineers, and medical workers with precise simulations of objects.

    g.       

     

    12.

    h.       

    LotusNotes and OpenText Livelink are examples of:

     

    a.            customized software.

    b.           VRML.

    c.            investment software.

    d.           Web tools. 

    e.            proprietary groupware.

    i.         

     

    13.

    j.         

    The terms used in fuzzy logic are called:

     

    a.          membership functions.

    b.          non-precise definitions.

    c.          oorts.

    d.         ranges.

    e.       eliminatory phrases.

    f.            

     

    14.

    g.           

    Even if a problem can be addressed by an information system, senior management:

     

    a.          may not be able to use one.

    b.          may not have a complete data warehouse.

    c.          may not be able to read the reports generated.

    d.         may not fully understand its actual information needs.

    e.          may decide that graphics are better.

    h.           

     

    15.

    i.             

    Model-driven DSS were often developed by:

     

    a.          senior managers in IS.

    b.          cross-divisional central management teams.

    c.          accident.

    d.         contracted consultants from outside the organization itself.

    e.    groups not under central information system control.

    a.           

     

    16.

    b.           

    Tools for voting or setting priorities in a GDSS:

     

    a.            facilitate the organized integration and synthesis of ideas generated during brainstorming. 

    b.           document group agreement on definitions of words and terms central to the projects.

    c.            use structured approaches to evaluate the impact of an emerging proposal on the organization.

    d.           aid the organizers in premeeting planning by identifying issues of concern.

    e.            Make available a range of methods for setting priorities or voting.

    c.           

     

    17.

    d.          

    Group interaction includes:

     

    a.            session planning, organizational memory, personal productivity, and enterprise analysis.

    b.           idea generation, complex problems, and large groups.

    c.            idea generation, idea organization, prioritizing, and policy development.

    d.           session planning, prioritizing, policy development, and organizational memory.

    e.            idea generation, personal productivity, enterprise analysis, and policy development.

    e.           

     

    18.

    f.            

    One problem with understanding the value of GDSS is their:

     

    a.                    availability and cost.

    b.                    complexity.

    c.                    need for organizational memory.

    d.                   need for a facilitator.

      e.           method of generating ideas.

    g.           

     

    19.

    h.           

    The components of the DSS are the:

     

    a.                    internal database, external database, and analysis tools.

    b.                    data visualization tools, software, and graphics capabilities.

    c.                    database, graphics capabilities, and analysis tools.

    d.                   analysis tools, software, and database.

                    e.         database, software system, and user interface.

    i.             

     

    20.

     

    When systems are used to strengthen the wrong business model or business processes,:

     

    a.                    the resulting information system is very difficult to analyze.

    b.                    the resulting system has no impact on the firm’s performance.

    c.                    the business becomes more efficient doing what it shouldn’t do.

    d.                   organizational change does not occur.

    e.             The cost increases geometrically.

    j.             

     

    21.

    k.           

     

    Two principal methodologies for establishing the essential information requirements of the organization as a whole are:

     

    a.                    personal interviews and critical success factors.

    b.                    enterprise analysis and systems analysis.

    c.                    object-oriented design and systems analysis.

    d.                   personal interviews and a review of historical data.

    e.                    enterprise analysis and critical success factors.

     

    22.

    l.             

    The most common form of IT-enabled organizational change is:

     

    a.                    rationalization of procedures.

    b.                    paradigm shifts.

    c.                    accessibility and empowerment.

    d.                   automation.

    e.                    business process reengineering.

    m.         

     

    23.

    n.           

    When the nature of the organization itself is radically reconceptualized, the result is:

     

    a.                    rationalization of procedures.

    b.                    paradigm shifts.

    c.                    accessibility and empowerment.

    d.                   automation.

      e.          business process reengineering.

    o.           

     

    24.

    p.           

    In terms of percentages, the maintenance phase devotes approximately _____ percent to changes in data, files, reports, hardware, or system software;

    a.              20

    b.             25

    c.              40

    d.             35

    e.              60

    q.           

     

    25.

    r.            

    WSDL:

     

    a.                    is a common framework for describing the tasks performed by a Web service so that it can be used by other applications.

    b.                    is a visually-oriented programming language.

    c.                    allows a Web service to be listed in the directory of Web services so that it can be easily located.

    d.                   is object-oriented and has open architecture.

    e.                    is a set of rules that allows applications to pass data and instructions to one another.

     

     

     

     

     

     

     

     

     (CHAPTER 13-15)

     

    INSTRUCTIONS TO THE CANDIDATES:

     

    Please carefully read the following questions and circle/tick your correct answer in the answer sheet provided in this Study Guide.  Give yourself time for rechecking after completion of test.

     

    1.       

    The worth of systems from a financial perspective essentially revolves around the question of:

     

    a.   systems ownership.

    b.   information requirements.

    c.   multiyear financial models.

    d.   change management.

    e.   return on invested capital.

     

    2.       

    Transaction and clerical systems that displace labor and save space always produce more measurable, tangible benefits than management information systems, decision-support systems, or computer-supported collaborative work systems,:

     

    a.   which allow a broader context of business analysis.

    b.   which give financial models an application bias.

    c.   which require a lower rate of technological change.

    d.   which mean that intangibles can be given monetary value.

    e.   which have expected lives of many years.

     

    3.       

    The payback period in years is found by the formula:

     

    a.   (Total benefits – Total cost – Depreciation)/Useful life

    b.   Present value of cash inflows/Investment

    c.   Payment * (1 –(1 + interest)-n)/Interest

    d.   Net benefit/Total initial investment

    e.   Original investment/Annual net cash inflow

     

    4.       

    The present value is found by the formula:

     

    a.   (Total benefits – Total cost – Depreciation)/Useful life

    b.   Present value of cash inflows/Investment

    c.   Payment * (1 –(1 + interest)-n)/Interest

    d.   Net benefit/Total initial investment

    e.   Original investment/Annual net cash inflow = Number of years for repayment

     

    5.       

    A weakness of the net present value is that:

     

    a.   it provides no measure of profitability.

    b.   it cannot be used to rank several projects for comparison.

    c.   it ignores the disposal value of the computer systems.

    d.   it cannot calculate a profitability index.

    e.   it can ignore the time value of money.

     

    6.       

    The portfolio analysis:

     

    a.   uses capital budgeting analysis principles.

    b.   determines the overall direction of systems development.

    c.   is the agreement on the criteria used to make a choice amongst several different projects.

    d.   can be described as having a certain profile of risk and benefit to the firm.

    e.   is not used by firms in non-information-intensive industries.

     

    7.       

    If the budget is strained from the very beginning, toward the end of the project there will likely be insufficient funds for:

     

    a.   training and documentation.

    b.   timely completion and procedural planning.

    c.   the necessary hardware and software.

    d.   unplanned-for structural changes.

    e.   new employees to manage the new technologies.

     

    8.       

    Most applications are designed, planned, and created by persons:

     

    a.   who do not understand the company substructure.

    b.   with no prior experience in the application area.

    c.   who are not stakeholders.

    d.   who are employed for the development of only that system.

    e.   who are managers, not end users.

     

    9.       

    Traditionally, the area of _____________________ has been neglected in systems design and analysis activities.

     

    a.   end-user training

    b.   organizational impact analysis

    c.   change management

    d.   power relationships within the organization

    e.   procedural documentation

     

    10.   

    Automated data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that:

     

    a.   are usually bound up in legacy systems that are difficult to access and difficult to correct in case of error.

    b.   are not secure because the technology to secure them did not exist at the time the files were created.

    c.   have the potential to be accessed by large numbers of people and by groups outside of the organization.

    d.   are frequently available on the Internet.

    e.   are written in obsolete programming languages.

     

    11.   

    Code Red and Nimda are:

     

    a.   viruses written in script programming languages that use Microsoft Outlook to spread to other systems.

    b.   “worm” type viruses that arrive attached to e-mail and spread from computer to computer.

    c.   “multipartite” viruses that can infect files as well as the boot sector of the hard drive.

    d.   viruses that make a clicking sound with each keystroke on the 18th day of the month.

    e.   macro viruses existing inside executable programs called macros.

     

    12.   

    The most expensive phase of the system development process is:

     

    a.   end-user training.

    b.   implementation.

    c.   testing.

    d.   maintenance.

    e.   systems design.

     

    13.   

    General controls:

     

    a.   are unique to each computer program.

    b.   ensure that data files on either disk or tape are not subject to unauthorized access, change, or destruction.

    c.   establish a framework for controlling the design, security, and use of computer programs throughout the organization.

    d.   audit the systems development process.

    e.   are formalized standards, rules, procedures, and disciplines that ensure that the organization’s controls are properly executed and enforced.

     

    14.   

    Hardware controls:

     

    a.   oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

    b.   ensure that computer hardware is physically secure and check for equipment malfunction.

    c.   audit the systems development process at various points to ensure that the processes are properly controlled and managed.

    d.   monitor the use of system software and prevent unauthorized access to software programs, systems software and computer programs.

    e.   ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

     

    15.   

    Software controls:

     

    a.   oversee the work of the computer department to ensure that programmed procedures are consistently and correctly applied to the storage and processing of data.

    b.   ensure that computer hardware is physically secure and check for equipment malfunction.

    c.   audit the systems development process at various points to ensure that the processes are properly controlled and managed.

    d.   monitor the use of system software and prevent unauthorized access to software programs, systems software and computer programs.

    e.   ensure that valuable business data files on either disk or tape are not subject to unauthorized access, change, or destruction while they are in use or in storage.

     

     

    16.   

    In a risk assessment, multiplying the average loss for each exposure by its probability of occurrence gives the:

     

    a.   loss range.

    b.   annual loss.

    c.   prediction of vulnerability.

    d.   threat ranking.

    e.   exposure capability.

     

    17.   

    A selection construct is:

     

    a.   the single step or action in the logic of a program that does not depend on the existence of any condition.

    b.   a logical unit of a program that performs one or several functions.

    c.   the logic pattern in programming where a stated condition determines which of two alternative actions can be taken.

    d.   the basic control structure that has only one entry point and one exit point.

    e.   the logic pattern in programming where certain actions are repeated until a specified condition occurs or until certain conditions are met.

     

    18.   

    The sequence construct is:

     

    a.   the single step or action in the logic of a program that does not depend on the existence of any condition.

    b.   a logical unit of a program that performs one or several functions.

    c.   the logic pattern in programming where a stated condition determines which of two alternative actions can be taken.

    d.   the basic control structure that has only one entry point and one exit point.

    e.   the logic pattern in programming where certain actions are repeated until a specified condition occurs or until certain conditions are met.

     

    19.   

    In moving to a global business, the challenge for management is to:

     

    a.   standardize global systems, and consolidate reporting.

    b.   create SAP enterprise software and a frame relay network.

    c.   facilitate global operations, and reduce costs.

    d.   set standards, and develop global business processes.

    e.   maintain global headquarters, business processes, and subsidiaries.

     

    20.   

    Two powerful worldwide changes driven by advances in information technology that have transformed the business environment and post new challenges for management are:

     

    a.   the creation of the NASA satellite system.

    b.   the transformation of industrial economies to knowledge-and information-based economies.

    c.   the emergence of the global economy and a global world order.

    d.   b and c only

    e.   a, b and c

     

    21.   

    In terms of global business strategy and structure, a transnational company will use a policy of:

     

    a.   mixed sales and marketing, with centralized production, accounting, human resources, and strategic management.

    b.   coordinated production, accounting, marketing, human resources, and strategic management.

    c.   coordinated production, accounting, human resources, with centralized strategic management, and marketing.

    d.   dispersed production and marketing, with centralized accounting, human resources and strategic management.

    e.   coordinated production, marketing, human resources, and strategic management, with dispersed production.

     

    22.   

    Decentralized systems are those in which:

     

    a.   development occurs at the home base and operations are handed over to autonomous units in foreign locations.

    b.   each foreign unit designs its own unique solutions and systems.

    c.   systems development and operations occur in an integrated and coordinated fashion across all units.

    d.   foreign units design the solutions and systems that are used at the domestic home base.

    e.   systems development and operations occur totally at the domestic home base.

     

    23.   

    Two of the management challenges in developing global systems are listed in your text as:

     

    a.   managing the privacy concerns of different countries and coordinating applications development.

    b.   creating a financial structure that will operate internationally and managing the privacy concerns of different countries.

    c.   subordination of software releases and managing the privacy concerns of different countries.

    d.   the coordination of software releases and the introduction of changes in business processes.

    e.   encouraging local users to support global systems and creating a financial structure that will operate internationally

     

    24.   

    For most people in developing countries, Internet access is:

     

    a.   easier than telephone access.

    b.   inexpensive.

    c.   very expensive.

    d.   essential.

    e.   through cable TV connections.

     

    25.   

    VPNs:

     

    a.   may not be able to support large numbers of remote users.

    b.   use private, leased telephone lines or frame-relay connections.

    c.   do not always have sufficient security for international services.

    d.   replace WANs for most international or global companies.

    e.   are not legal in many countries.