Você está na página 1de 59

Exam

Name___________________________________
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1
The six important business objectives of information technology are new products, services, and business models;
customer and supplier intimacy; survival; competitive advantage; operational excellence; and:

1)

_______
A)
improved decision making.

B)

improved business practices.


C)
improved efficiency.

D)

improved flexibility.

2
Which of the following choices may lead to competitive advantage (1) new products, services, and business models; (2)
charging less for superior products; (3) responding to customers in real time?

2)

_______
A)
1 only

B)

1 and 2
C)
2 and 3

D)

1, 2, and 3

3
An information system can be defined technically as a set of interrelated components that collect (or retrieve), process,
store, and distribute information to support:

3)

_______
A)
decision making and control in an organization.
B)
the creation of new products and services.
C)
communications and data flow.
D)
managers analyzing the organization's raw data.

4
The three activities in an information system that produce the information organizations use to control operations are:

4)

_______
A)
information retrieval, research, and analysis.
B)
input, processing, and output.
C)
input, output, and feedback.
D)
data analysis, processing, and feedback.

5
The average number of tickets sold daily online is an example of:

5)

_______
A)
input.

B)

raw data.
C)
output.

D)

meaningful information.

6
In a hierarchical organization, the upper levels consist of:

6)

_______
A)
professional and operational employees.
B)
managerial, professional, and operational employees.
C)
managerial and professional employees.
D)
managerial, professional, and technical employees.

7
Data management technology consists of:

7)

_______
A)
the detailed, preprogrammed instructions that control and coordinate the computer hardware components in an
information system.
B)
the physical hardware and media used by an organization for storing data.
C)
the software governing the organization of data on physical storage media.
D)
the hardware and software used to transfer data.

8
Based on the examples in the chapter, if you were asked to formulate a plan for a regional drive-in restaurant chain's
efforts to use information technology to attract customers, what would be the best use of information technology from the
list below:

8)

_______
A)
Use IT to create new products and business models.
B)
Use IT to increase supplier loyalty.
C)
Use IT to increase operational efficiency.
D)
Use IT to achieve customer intimacy.
E)
Use IT to help survive government reporting requirements.

9
Toyota Motor Europe's vehicle orders management system allows it to improve efficiency by basing vehicle production
on:

9)

_______
A)
actual customer orders.
B)
superior forecasts of regional demand.
C)
improved decision making.
D)
customer preferences.
10)
From a business perspective, raw data is transformed systematically during various stages, transforming it into valuable
information, in a process called:

10)

______
A)
feedback.

B)

information processing.
C)
the IT value chain.

D)

the information value chain.

1
An example of an organizational complementary asset is:

11)

______
A)
laws and regulations.
B)
using the appropriate business model.
C)
as collaborative work environment.
D)
all of the above.

1
Disciplines that contribute to the technical approach to information systems are:

12)

______
A)
operations research, management science, and computer science.
B)
computer science, engineering, and networking.
C)
engineering, utilization management, and computer science.
D)
management science, computer science, and engineering.

1
The discipline that focuses on mathematical techniques for optimizing parameters of organizations, such as transportation
and inventory control is:
13)

______
A)
operations research.

B)

utilization management.
C)
management science.

D)

MIS.

1
A firm that must invest in new information systems capabilities in order to comply with federal legislation can be said to
be investing to achieve which business objective?

14)

______
A)
Improved reporting

B)

Operational excellence
C)
Survival

D)

Customer intimacy

1
The three principle levels within a business organization hierarchy are:

15)

______
A)
senior management, middle management, and operational management.
B)
senior management, operational management, and information systems.
C)
senior management, operational management, and service workers.
D)
senior management, middle management, and service workers.

1
A managerial element in the UPS tracking system described in the chapter is:

16)

______
A)
the decision to use automation.
B)
taking inventory.
C)
in-house package tracking software.
D)
providing package status reports to customers.

1
Kia's difficulties in getting a complete picture of defects in their cars illustrates:

17)

______
A)
the challenges posed by having multiple information systems that are not linked.
B)
the compromises made in drawing accurate reports from poorly planned information systems.
C)
the difficulties in complying with government regulations.
D)
the difficulties in creating accurate tracking systems.

1
How would you best categorize the types of systems Kia implemented in their defect early warning system?

18)

______
A)
A TPS to store basic data about vehicles, parts, sales, and warranties, and a DSS for high-level analysis and forecasts
B)
An MIS to create reports from existing TPSs and a DSS for high-level analysis and forecasts
C)
A TPS to store basic data about vehicles, parts, sales, and warranties, and an MIS to create reports on the data
D)
A production and manufacturing system to record basic data about faulty parts and a DSS for high-level analysis and
forecasts

1
Which of the following is a cross-functional business process?

19)

______
A)
Creating an invoice
B)

Hiring an employee
C)
Identifying a customer

D)

Fulfilling a customer order

2
Promoting the organization's products or services is a responsibility of the:

20)

______
A)
manufacturing and production function.
B)
sales and marketing function.
C)
human resources function.
D)
finance and accounting function.

2
Market research is an activity associated with the:

21)

______
A)
sales and marketing function.
B)
human resources function.
C)
manufacturing and production function.
D)
finance and accounting function.

2
A sales and marketing information system aids middle management employees in:

22)

______
A)
tracking sales.
B)
planning new products and services.
C)
preparing sales forecasts.
D)
analyzing sales performance.

2
Senior management uses finance and accounting information systems to:

23)

______
A)
control the firms' financial resources.
B)
decide where to locate new facilities.
C)
plan long-term profits.
D)
forecast sales trends.

2
Budgeting is typically a feature of an information system serving:

24)

______
A)
middle management.

B)

operational management.
C)
senior management.

D)

sales and marketing.

2
Compensation analysis is an example of:

25)

______
A)
enterprise application information systems.
B)
finance and accounting information systems.
C)
human resources information systems.
D)
sales and marketing information systems.

2
These systems are typically a major source of data for other systems:

26)

______
A)
transaction processing systems.
B)
executive support systems.
C)
decision-support systems.
D)
management information systems.

2
Decisions that are unique, rapidly changing, and not easily specified in advance are best suited to this type of system:

27)

______
A)
transaction processing.

B)

executive support.
C)
decision-support.

D)

management.

2
Executive support systems are information systems that support the:

28)

______
A)
decision-making and administrative activities of middle managers.
B)
day-to-day processes of production.
C)
knowledge and data workers in an organization.
D)
long-range planning activities of senior management.

2
Decision-support systems are often referred to as:

29)
______
A)
business information systems.
B)
business modeling systems.
C)
business intelligence systems.
D)
business analysis systems.

3
These systems are designed to support organization-wide process coordination and integration.

30)

______
A)
Management information systems
B)
Decision-support systems
C)
Enterprise applications
D)
CRM

3
What competitive force was the most dominant in preventing US Airways from success, as discussed in the chapter case?

31)

______
A)
Suppliers
B)
New market entrants
C)
Traditional competitors
D)
Substitute products and services

3
How does the technical view of organizations fall short of understanding the full impacts of information systems in a
firm?

32)

______
A)
It sees information systems as a way to rearrange the inputs and outputs of the organization.
B)
It sees capital and labor as primary production factors.
C)
It sees the organization as a social structure similar to a machine.
D)
It sees the inputs and outputs, labor and capital, as being infinitely malleable.

3
Mintzberg's classification of organizational structure categorizes the knowledge-based organization where goods and
services depend on the expertise and knowledge of professionals as a(n):

33)

______
A)
entrepreneurial structure.

B)

adhocracy.
C)
divisionalized bureaucracy.

D)

professional bureaucracy.

3
According to agency theory, the firm is viewed as a(n):

34)

______
A)
unified, profit-maximizing entity.
B)
"Nexus of contracts" among self-interested individuals.
C)
task force organization that must respond to rapidly changing environments.
D)
entrepreneurial endeavor.

3
Amazon's use of the Internet as a platform to sell books illustrates a tactical use of information services for:

35)

______
A)
low-cost leadership.
B)
strengthening customer intimacy.
C)
focusing on market niche.
D)
product differentiation.
36)
You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from
implementing new information systems. What will you advise as the first step?

36)

______
A)
Perform a strategic systems analysis.
B)
Benchmark existing systems.
C)
Identify the business ecosystem the distributor is in.
D)
Implement a strategic transition to the new system.

3
The ________ model is used to describe the interaction of external forces that affect an organization's strategy and ability
to compete.

37)

______
A)
competitive forces

B)

competitive advantage
C)
network economics

D)

demand control

3
Wal-Mart's continuous replenishment system allows it to:

38)

______
A)
achieve economy of scale.
B)
strengthen customer intimacy.
C)
provide mass customization.
D)
provide an efficient customer response system.

3
________ is the ability to offer individually tailored products or services using the same production resources as bulk
production.

39)

______
A)
Dimension customization

B)

Magnitude customization
C)
Mass customization

D)

Size customization

4
The value chain model:

40)

______
A)
sees the supply chain as the primary activity for adding value.
B)
categorizes four basic strategies a firm can use to enhance its value chain.
C)
categorizes five related advantages for adding value to a firm's products or services.
D)
helps a firm identify points at which information technology can most effectively enhance its competitive position.

4
The primary activities of a firm include:

41)

______
A)
procurement, inbound logistics, operations, technology, and outbound logistics.
B)
inbound logistics, operations, outbound logistics, sales and marketing, and service.
C)
procurement, operations, technology, sales and marketing, and services.
D)
inbound logistics, operations, outbound logistics, technology, and service.

4
Benchmarking:

42)
______
A)
allows industry participants to influence industry-wide standards.
B)
is used to measure the speed and responsiveness of information technology.
C)
compares the efficiency and effectiveness of your business processes against strict standards.
D)
synchronizes the business processes of customers, suppliers, and trading partners.

4
The most successful solutions or methods for achieving a business objective are called:

43)

______
A)
core competencies.

B)

best practices.
C)
best processes.

D)

value activities.

4
Network economics:

44)

______
A)
sees the cost of adding new members as inconsequential.
B)
balances the high cost of adding new members to a community against the lower cost of using network infrastructure.
C)
applies the law of diminishing returns to communities of users.
D)
applies traditional economics to networked users.

4
According to Leavitt's model of organizational resistance, the four components that must be changed in an organization
in order to successfully implement a new information system are:

45)

______
A)
technology, people, culture, and structure.
B)
organization, culture, management.
C)
tasks, technology, people, and structure.
D)
environment, organization, structure, tasks.

4
Which of the following is not an IT infrastructure service component?

46)

______
A)
Operating system software
B)
IT management services to plan and develop the infrastructure and provide project management
C)
Physical facility management to manage the facilities housing physical components
D)
Computing platforms to provide a coherent digital environment

4
In a multi-tiered network:

47)

______
A)
the work of the entire network is balanced over several levels of servers.
B)
processing is split between clients and servers.
C)
the work of the entire network is centralized.
D)
processing is handled by multiple, geographically remote clients.

4
Today's nanotechnology-produced computer transistors are roughly equivalent in size to:

48)

______
A)
a virus.

B)

an atom.
C)
a human hair.

D)
the width of a fingernail.

4
Specifications that establish the compatibility of products and the ability to communicate in a network are called:

49)

______
A)
telecommunications standards.
B)
technology standards.
C)
Internet standards.
D)
network standards.

5
The multitasking, multi-user, operating system developed by Bell Laboratories that operates on a wide variety of
computing platforms is:

50)

______
A)
Unix.

B)

COBOL.

C)

Mac OS.

D)

Linux.

5
Software that manages the resources of the computer is called:

51)

______
A)
operating system software.

B)

application software.
C)
network software.

D)

data management software.

5
A SAN is a:

52)

______
A)
service-oriented architecture network.
B)
storage area network.
C)
scalable architecture network.
D)
server area network.

5
Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:

53)

______
A)
grid computing.

B)

edge computing.
C)
co-location.

D)

utility computing.

5
This type of computing refers to firms off-loading peak requests for computing power to remote, large-scale data
processing centers.

54)

______
A)
Autonomic

B)

Edge
C)
On-demand

D)

Grid

5
An example of autonomic computing is:

55)

______
A)
software programmed to run on any hardware platform.
B)
cell phones taking on the functions of handheld computers.
C)
spyware protection software that runs and updates itself automatically.
D)
programming languages that allow non-programmers to create custom applications.

5
The components of edge computing are:

56)

______
A)
local client, ISP servers, corporate enterprise servers.
B)
ISP servers, corporate enterprise servers, Web servers.
C)
ISP servers, corporate Web servers, corporate enterprise servers.
D)
local client, corporate Web servers, corporate enterprise servers.

5
Linux is:

57)

______
A)
primarily concerned with the tasks of end users.
B)
especially useful for processing numeric data.
C)
an example of open-source software.
D)
designed for specific machines and specific microprocessors.

5
The single most urgent software priority for U.S. firms is:

58)

______
A)
integrating legacy applications with newer Web-based technologies into a single system.
B)
replacing legacy applications with newer technologies and services.
C)
integrating Internet technologies.
D)
standardizing existing applications.

5
Commercially available software that enables multiple systems to exchange data through a single software hub is called:

59)

______
A)
EAI software.

B)

WSDL services.
C)
XML software.

D)

SOAP.

6
What is the foundation technology for Web services?

60)

______
A)
SOAP

B)

HTML

C)

XML

D)

UDDI
6
A set of self-contained services that communicate with each other to create a working software application is called:

61)

______
A)
SOAP.

B)

Web services.
C)
SOA.

D)

EAI software.

6
Software applications that are based on combining different online software applications are called:

62)

______
A)
integrated software.

B)

Ajax.
C)
edge computing.

D)

mashups.

6
An ASP:

63)

______
A)
uses centrally managed facilities to host and manage access to package applications delivered over networks on a
subscription basis.
B)
manages combinations of applications, networks, systems, storage, and security as well as providing Web site and
systems performance monitoring to subscribers over the Internet.
C)
supplies online access over networks to storage devices and storage area network technology.
D)
all of the above.

6
Which of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users
without breaking down?

64)

______
A)
Scalability

B)

Modifiability
C)
Expandability

D)

Disintermediation

6
A characteristic or quality describing an entity is called a(n):

65)

______
A)
tuple.

B)

field.

C)

attribute.

D)

key field.

6
Duplicate data in multiple data files is:

66)

______
A)
data backups.
B)

data independence.
C)
data redundancy.

D)

data multiplication.

6
The logical view:

67)

______
A)
presents an entry screen to the user.
B)
presents data as perceived by end users.
C)
shows how data are organized and structured on the storage media.
D)
allows the creation of supplementary reports.

6
The type of logical database model that treats data as if they were stored in two-dimensional tables is the:

68)

______
A)
OODBMS.

B)

relational DBMS.
C)
pre-digital DBMS.

D)

hierarchical DBMS.

6
Microsoft SQL Server is a(n):

69)

______
A)
DBMS for small handheld computing devices.
B)
DBMS for midrange computers.
C)
desktop relational DBMS.
D)
Internet DBMS.

7
In a relational database, the three basic operations used to develop useful sets of data are:

70)

______
A)
select, from, and join.

B)

select, project, and where.


C)
select, join, and where.

D)

select, project, and join.

7
An automated or manual file that stores information about data elements and data characteristics such as usage, physical
representation, ownership, authorization, and security is the:

71)

______
A)
data dictionary.

B)

entity-relationship diagram.
C)
data definition diagram.

D)

relationship dictionary.

7
Which of the following database types is useful for storing java applets as well as processing large numbers of
transactions?

72)

______
A)
Hierarchical DBMS

B)

OODBMS
C)
Object-relational DBMS

D)

Relational DBMS

7
The most prominent data manipulation language today is:

73)

______
A)
SQL.

B)

Crystal Reports.
C)
Access.

D)

DB2.

7
A schematic of the entire database that describes the relationships in a database is called a(n):

74)

______
A)
intersection relationship diagram.
B)
data dictionary.
C)
data definition diagram.
D)
entity-relationship diagram.

7
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

75)

______
A)
data scrubbing.

B)

normalization.
C)
data cleansing.

D)

data defining.

7
A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:

76)

______
A)
a data mart uses a Web interface.
B)
all of the information belongs to a single company.
C)
all the information is historical.
D)
a data mart typically focuses on a single subject area or line of business.

7
The special organizational function whose responsibilities include the technical and operational aspects of managing data,
including physical database design and maintenance, is called:

77)

______
A)
information policy administration.
B)
data administration.
C)
data auditing.
D)
database administration.

7
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is
called:

78)

______
A)
defragmentation.
B)

data optimization.
C)
data scrubbing.

D)

data auditing.

7
A device that acts as a connection point between computers and can filter and forward data to a specified destination is
called a:

79)

______
A)
hub.

B)

switch.

C)

NIC.

D)

router.

8
The Internet is based on the following three key technologies:

80)

______
A)
TCP/IP, HTML, HTTP.
B)
client/server computing, packet switching, and HTTP.
C)
client/server computing, packet switching, and the development of widely used communications standards for linking
networks and computers.
D)
TCP/IP, HTTP, and packet switching.

8
Data is sent through the fiber-optic cable by a(n):

81)
______
A)
optical device.

B)

router.
C)
laser device.

D)

multiplexer.

8
Which type of signals follow a straight line and do not bend with the curve of the Earth?

82)

______
A)
fiber-optic

B)

satellite
C)
microwave

D)

radio

8
Bandwidth is:

83)

______
A)
the number of frequencies that can be broadcast through a medium.
B)
the total number of bytes that can be sent through a medium per second.
C)
the difference between the highest and lowest frequencies that can be accommodated on a single channel.
D)
the number of cycles per second that can be sent through a medium.

8
Which of the following services enables logging on to one computer system and working on another?

84)
______
A)
Telnet

B)

World Wide Web


C)
FTP

D)

LISTSERV

8
Together, a protocol prefix, a domain name, a directory path, and a document name, are called a:

85)

______
A)
uniform resource locator.

B)

third-level domain.
C)
root domain.

D)

domain name.

8
What technology allows people to have content pulled from Web sites and fed automatically to their computers?

86)

______
A)
Bluetooth

B)

LISTSERV
C)
RSS

D)

FTP

8
Which technology uses the Internet Protocol to deliver voice information in digital form using packet switching?

87)

______
A)
VPN
B)
VoIP
C)
TCP/IP
D)
None, voice information is digitally delivered using ATM

8
A VPN:

88)

______
A)
is an Internet-based service for delivering voice communications.
B)
is more expensive than a dedicated network.
C)
provides secure, encrypted communications using Telnet.
D)
is an encrypted private network configured within the public Internet.

8
In a RFID system, a(n) ________ is electronically programmed with information that can uniquely identify an item, such
as an electronic code.

89)

______
A)
microchip

B)

reader
C)
transponder

D)

antenna

9
A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and
sales and marketing that allows data to be used by multiple functions and business processes best describes:
90)

______
A)
process management software.
B)
application software.
C)
groupware.
D)
ERP systems.

9
In order to achieve maximum benefit from an enterprise software package, a business:

91)

______
A)
selects only the software that best matches its existing business processes.
B)
uses only the processes in the software that match its own processes.
C)
customizes the software to match all of its business processes.
D)
changes the way it works to match the software's business processes.

9
When tailoring a particular aspect of a system to the way a company does business, enterprise software can provide the
company with:

92)

______
A)
data dictionaries.

B)

project workbooks.
C)
configuration tables.

D)

state transition diagrams.

9
A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is:

93)

______
A)
the supplier's internal supply chain.
B)
the external supply chain.
C)
the downstream portion of the supply chain.
D)
the upstream portion of the supply chain.

9
A distortion of information about the demand for a product as it passes from one entity to the next across the supply
chain is called:

94)

______
A)
exponential effect.

B)

replenishment effect.
C)
bullwhip effect.

D)

ripple effect.

9
Supply chain software can be classified as either:

95)

______
A)
supply chain planning systems or supply chain build systems.
B)
supply chain planning systems or supply chain execution systems.
C)
supply chain build systems or supply chain delivery systems.
D)
supply chain source systems or supply chain recovery systems.

9
Capabilities of supply chain planning systems would not include:

96)

______
A)
replenishment.
B)
order planning.
C)
demand planning.
D)
advanced scheduling and manufacturing planning.

9
A supply chain driven by actual customer orders or purchases follows a:

97)

______
A)
build-to-stock model.
B)
pull-based model.
C)
push-based model.
D)
replenishment-driven model.

9
Which of the following enterprise software deals with employee issues such as setting objectives, employee performance
management, performance-based compensation, and employee training?

98)

______
A)
Supply chain management software
B)
Customer relationship management software
C)
Employee relationship management software
D)
Enterprise systems software

9
What are the three general business functions that CRM software serves?

99)

______
A)
Sales, customer service, and marketing
B)
ERM, PRM, and CRM
C)
Sales and marketing, customer service, and human resources
D)
Sales and marketing, human resources, and finance and accounting

1
Which type of enterprise application or technique would help you best identify hidden buying patterns of your
customers?

100)

_____
A)
Data mining using a CRM system
B)
OLAP using a SCM system
C)
Predictive analysis using a PRM system
D)
None of the above

1
Knowledge that resides in the minds of employees that has not been documented is called:

101)

_____
A)
standard operating procedures.
B)
organizational memory.
C)
corporate culture.
D)
tacit knowledge.

1
Changing organizational behavior by sensing and responding to new experience and knowledge is called:

102)

_____
A)
change management.

B)

organizational learning.
C)
the knowledge value chain.

D)

knowledge networking.

1
These systems digitize, index, and tag documents according to a coherent framework.

103)
_____
A)
Wikis

B)

CAD
C)
LMS

D)

Document management

1
Which of the following are major types of knowledge management systems?

104)

_____
A)
Enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques
B)
Management information systems, decision support systems, and transaction processing systems
C)
Database management systems, expert systems, and knowledge work systems
D)
Enterprise systems, customer support systems, and supply chain management systems

1
These are specialized systems built for engineers, scientists, and other knowledge workers charged with discovering and
creating new knowledge for a company:

105)

_____
A)
KWS.

B)

LMS.
C)
CAD systems.

D)

Wikis.

1
Knowledge that already exists inside a firm in the form of formal reports or presentations is categorized as:
106)

_____
A)
structured knowledge.

B)

tacit knowledge.
C)
semistructured knowledge.

D)

unstructured knowledge.

1
Once a knowledge taxonomy is developed, documents are all ________ with the proper classification.

107)

_____
A)
referenced

B)

tupled
C)
tagged

D)

linked

1
Which of the following is a collaboration tool used to support knowledge management systems?

108)

_____
A)
Wikis

B)

Social bookmarking
C)
Blogs

D)
All of the above

1
Which of the following would not be classified as a knowledge work system?

109)

_____
A)
Case-based reasoning

B)

3D visualization
C)
Investment workstations

D)

Computer-aided design

1
Which of the following is a type of intelligent technique?

110)

_____
A)
VRML

B)

Knowledge networks
C)
Computer-aided design

D)

Case based reasoning

1
Investment workstations:

111)

_____
A)
provide engineers, designers, and factory managers with precise control over industrial design and manufacturing.
B)
provide an important source of expertise for organizations.
C)
are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio
management.
D)
allow groups to work together on documents.

1
Genetic algorithms:

112)

_____
A)
are based on logic.
B)
represent knowledge as groups of characteristics.
C)
do not work for most problems.
D)
develop solutions to particular problems using fitness, crossover, and mutation.

1
Which of the following describes a difference between neural networks and genetic algorithms?

113)

_____
A)
Neural networks are programmed to "learn".
B)
Genetic algorithms are designed to process large amounts of information.
C)
Genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique.
D)
All of the above

1
To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain
management a firm would most likely use:

114)

_____
A)
intelligent agents.

B)

fuzzy logic systems.


C)
virtual reality systems.

D)

CAD systems.
115)
Mintzberg's classification of managerial roles defines three main categories:

115)

_____
A)
technical, interpersonal, and informational.
B)
symbolic, decisional, and interpersonal.
C)
symbolic, interpersonal, and technical.
D)
interpersonal, informational, and decisional.

1
Simon's description of decision making consists of four stages:

116)

_____
A)
planning, financing, implementation, and maintenance.
B)
intelligence, design, financing, and implementation.
C)
planning, design, implementation, and maintenance.
D)
intelligence, design, choice, and implementation.

1
Which type of decision is most common at higher levels of management?

117)

_____
A)
Structured

B)

Undocumented
C)
Semistructured

D)

Unstructured

1
Which type of decision is more prevalent at lower organizational levels?

118)
_____
A)
Unstructured

B)

Procedural
C)
Semistructured

D)

Structured

1
Which phase of decision making finds or recognizes a problem, need, or opportunity?

119)

_____
A)
Intelligence

B)

Design
C)
Implementation

D)

Choice

1
The role of liaison falls into which of Mintzberg's managerial classifications?

120)

_____
A)
Symbolic

B)

Decisional
C)
Interpersonal

D)

Informational
121)
The concern that data values of an information source fall within a defined range reflects which quality dimension of
information?

121)

_____
A)
Validity

B)

Accuracy
C)
Integrity

D)

Consistency

1
The concern that the structure of data is consistent within an information source reflects which quality dimension of
information?

122)

_____
A)
Accuracy

B)

Consistency
C)
Integrity

D)

Validity

1
MIS typically produce:

123)

_____
A)
fixed, regularly scheduled reports based on data extracted from the organization's TPS.
B)
solutions to semistructured problems appropriate for middle management decision making.
C)
new ways of looking at data that emphasize change, flexibility, and rapid response.
D)
assumptions, responses to ad hoc queries, and graphic representations of existing data.

1
Which type of model asks what-if questions repeatedly to determine the impact on outcomes of changes in one or more
factors?

124)

_____
A)
Optimization

B)

Forecasting
C)
Statistical

D)

Sensitivity analysis

1
Backward sensitivity analysis software is used for:

125)

_____
A)
goal seeking.

B)

historical what-if analysis.


C)
reverse forecasting.

D)

supply chain optimization.

1
This information system uses data visualization technology to analyze and display data for planning and decision making
in the form of digitized maps.

126)

_____
A)
MIS

B)
TPS

C)

GIS

D)

DSS

1
ESS:

127)

_____
A)
easily integrate data from different systems.
B)
are primarily driven by information derived from a company's transaction processing systems.
C)
support the structured decision making of senior executives.
D)
have the ability to drill down into lower levels of detail.

1
Which of the following features of an ESS supplements traditional financial metrics with measurements from additional
perspectives, such as customers, or learning and growth?

128)

_____
A)
Balanced scorecards

B)

Graphic visualization tools


C)
Digital dashboard

D)

Drill-down capabilities

1
Idea organizers in a GDSS:

129)

_____
A)
facilitate the organized integration and synthesis of ideas generated during brainstorming.
B)
aid the organizers in pre-meeting planning by identifying issues of concern.
C)
document group agreement on definitions of words and terms central to the projects.
D)
use structured approaches to evaluate the impact of an emerging proposal on the organization.

1
A pivot table is a:

130)

_____
A)
type of relational database.
B)
spreadsheet tool that displays two or more dimensions of data in a convenient format.
C)
tool for performing sensitivity analysis.
D)
chart tool that can rotate columnar data quickly and visually.

1
The role of entrepreneur falls into which of Mintzberg's managerial classifications?

131)

_____
A)
Symbolic

B)

Informational
C)
Interpersonal

D)

Decisional

1
Which of the following is used for knowledge discovery?

132)

_____
A)
Expert systems
B)
Data mining
C)
Transaction processing systems
D)
Case-based reasoning

1
A collection of internal and external knowledge in a single location for more efficient management and utilization by the
organization is called a:

133)

_____
A)
document database.
B)
KWS.
C)
document management system.
D)
knowledge repository.

1
Fuzzy logic is a type of:

134)

_____
A)
intelligent technique.

B)

data mining.
C)
neural network.

D)

business intelligence.

1
A company's organizations and processes for distributing and delivering products to the final customers is:

135)

_____
A)
the upstream portion of the supply chain.
B)
the external supply chain.
C)
the supplier's internal supply chain.
D)
the downstream portion of the supply chain.
136)
This type of software enables data to be used by multiple functions and business processes for organization coordination
and control:

136)

_____
A)
collaboration software.

B)

application software.
C)
enterprise software.

D)

groupware.

1
The total amount of digital information that can be transmitted through any telecommunications medium is measured in:

137)

_____
A)
gigaflops.

B)

baud.
C)
hertz.

D)

bps.

1
Digital subscriber lines:

138)

_____
A)
have up to twenty-four 64-Kbps channels.
B)
operate over existing telephone lines to carry voice, data, and video.
C)
are very high-speed data lines typically leased from long-distance telephone companies.
D)
operate over coaxial lines to deliver Internet access.
1
What service converts IP addresses into more recognizable alphanumeric names?

139)

_____
A)
FTP

B)

HTML

C)

DNS

D)

HTTP

1
The most important communication standard today for linking disparate computers and networks is:

140)

_____
A)
Transmission Control Protocol/Internet Protocol (TCP/IP).
B)
File Transfer Protocol (FTP).
C)
Open Systems Interconnection (OSI).
D)
International Standards Organization (ISO).

1
These signals are represented by a continuous waveform:

141)

_____
A)
digital.

B)

laser.

C)

optical.
D)

analog.

1
A LAN:

142)

_____
A)
links all computers in a closed loop in a manner that passes data in one direction from one computer to another.
B)
is a central switching system that handles a firm's voice and digital communications.
C)
links all computers and other devices to a central host computer, through which all communications must pass.
D)
connects computers and peripheral devices located close to each other, often in the same building.

1
Which type of network would be most appropriate for a business that comprised three employees and a manager located
in the same office space, whose primary need is to share documents?

143)

_____
A)
Peer-to-peer network
B)
Domain-based LAN
C)
Campus area network
D)
Wireless network in infrastructure mode

1
All network components connect to a single hub in a:

144)

_____
A)
domain network.

B)

bus network.
C)
star network.

D)
peer-to-peer network.

1
A network that covers a large geographic area is most commonly referred to as a(n):

145)

_____
A)
peer-to-peer.

B)

Intranet.
C)
wide area network.

D)

local area network.

1
Which device sends data packets to all connected devices in a network?

146)

_____
A)
Hub

B)

Network interface card


C)
Router

D)

None of the above

1
Tools for consolidating, analyzing, and providing access to vast amounts of data to help users make better business
decisions are known as:

147)

_____
A)
OLAP.

B)

data mining.
C)
DSS.

D)

business intelligence.

1
The tool that enables users to view the same data in different ways using multiple dimensions is:

148)

_____
A)
data mining.

B)

OLAP.
C)
predictive analysis.

D)

SQL.

1
Data mining is a tool for allowing users to:

149)

_____
A)
quickly compare transaction data gathered over many years.
B)
obtain online answers to ad hoc questions in a rapid amount of time.
C)
find hidden relationships in data.
D)
summarize massive amounts of data into much smaller, traditional reports.

1
In terms of data relationships, associations refers to:

150)

_____
A)
undiscovered groupings.
B)
events linked over time.
C)
occurrences linked to a single event.
D)
patterns that describe a group to which an item belongs.

1
In what type of a database system is the central database replicated at all remote locations?

151)

_____
A)
Networked

B)

Partitioned
C)
Distributed

D)

Normalized

1
A data warehouse is composed of:

152)

_____
A)
internal and external data sources.
B)
current data.
C)
historic and current internal data.
D)
historical data from legacy systems.

1
The select operation:

153)

_____
A)
combines relational tables to provide the user with more information than is otherwise available.
B)
creates a subset consisting of all records in the file that meet stated criteria.
C)
creates a subset consisting of columns in a table.
D)
identifies the table from which the columns will be selected.

1
The join operation:

154)

_____
A)
creates a subset consisting of columns in a table.
B)
organizes elements into segments.
C)
identifies the table from which the columns will be selected.
D)
combines relational tables to provide the user with more information than is otherwise available.

1
The project operation:

155)

_____
A)
identifies the table from which the columns will be selected.
B)
combines relational tables to provide the user with more information than is otherwise available.
C)
organizes elements into segments.
D)
creates a subset consisting of columns in a table.

1
In a table for customers, the information about a single customer would reside in a single:

156)

_____
A)
table.

B)

row.

C)

field.

D)

column.

1
A field identified in a table as holding the unique identifier of the table's records is called the:
157)

_____
A)
key field.

B)

unique ID.
C)
primary field.

D)

primary key.

1
When a firm purchases computing power from a central computing service and pays only for the amount of computing
power it uses, this is commonly referred to as:

158)

_____
A)
edge computing.

B)

grid computing.
C)
autonomic computing.

D)

utility computing.

1
The four major types of competitive strategy are:

159)

_____
A)
new market entrants; substitute products and services; customers; and suppliers.
B)
low-cost leadership; substitute products and services; customers; and suppliers.
C)
low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy.
D)
low-cost leadership; new market entrants; product differentiation; and focus on market niche.

1
What strategy to counter competitive forces does US Airways emphasize in the case study for this chapter?
160)

_____
A)
Low-cost leadership

B)

Customer intimacy
C)
Focus on market niche

D)

Product differentiation

1
The interaction between information systems and organizations is:

161)

_____
A)
a complex, two-way relationship mediated by factors such as the environment and organizational structure.
B)
successfully managed when the organization's existing culture and goals are seen as the driving force.
C)
is driven by the microeconomic forces of capital and labor.
D)
primarily guided by the decision making of middle- and senior-managers.

1)

A
2)
D
3)
A
4)
B
5)
D
6)
D
7)
C
8)
A
9)
C
10)
D
11)
B
12)
A
13)
A
14)
C
15)
A
16)
A
17)
A
18)
B
19)
D
20)
B
21)
A
22)
D
23)
C
24)
A
25)
C
26)
A
27)
C
28)
D
29)
C
30)
C
31)
C
32)
D
33)
D
34)
B
35)
A
36)
A
37)
A
38)
D
39)
C
40)
D
41)
B
42)
C
43)
B
44)
A
45)
C
46)
A
47)
A
48)
A
49)
B
50)
A
51)
A
52)
B
53)
A
54)
C
55)
C
56)
A
57)
C
58)
A
59)
A
60)
C
61)
C
62)
D
63)
A
64)
A
65)
C
66)
C
67)
B
68)
B
69)
B
70)
D
71)
A
72)
C
73)
A
74)
D
75)
B
76)
D
77)
D
78)
C
79)
B
80)
C
81)
C
82)
C
83)
C
84)
A
85)
A
86)
C
87)
B
88)
D
89)
C
90)
D
91)
D
92)
C
93)
D
94)
C
95)
B
96)
A
97)
B
98)
C
99)
A
100)
A
101)
D
102)
B
103)
D
104)
A
105)
A
106)
A
107)
C
108)
D
109)
A
110)
D
111)
C
112)
D
113)
A
114)
A
115)
D
116)
D
117)
D
118)
D
119)
A
120)
C
121)
A
122)
C
123)
A
124)
D
125)
A
126)
C
127)
D
128)
A
129)
A
130)
B
131)
D
132)
B
133)
D
134)
A
135)
D
136)
C
137)
D
138)
B
139)
C
140)
A
141)
D
142)
D
143)
A
144)
C
145)
C
146)
A
147)
D
148)
B
149)
C
150)
C
151)
C
152)
C
153)
B
154)
D
155)
D
156)
B
157)
D
158)
D
159)
C
160)
A
161)
A

Você também pode gostar