• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/38

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

38 Cards in this Set

  • Front
  • Back

Which of the following is not a characteristic of a transaction processing system?



A) Small amounts of data are processed


B) Sources of data are mainly internal


C) Low computation complexity


D) High level of accuracy, data integrity, and security


E) High level of detail

A) Small amounts of data are processed

Which of the following is false?




A) Inventory management determines how much inventory to order.


B) Large companies allow their vendors to manage their inventory.


C) The POM function within an organization monitors sales.


D) Quality control used by manufacturing units uses metrics.


E) Computer systems are used to integrate all aspects of product design.

C) The POM function within an organization monitors sales.


_____ reports contain special information not found in routine reports.



A) Ad hoc


B) Summary


C)Drill-down


D) Key-indicator


E) Exception

A) Ad hoc

Kathy has taken a job with her ideal company and is excited to start in their sales department. During orientation, she is told that the company is very proud of their ERP system from SAP. Looking at the list of modules the company has, Kathy wonders which one she won’t be using. From the list below, which one would you tell Kathy is the one she won’t be using.




A) Customer relationship management


B) Human resource management


C) Business intelligence


D) Operations management


E) E-Business

D) Operations management

Greg is mowing lawns in the neighborhood for the summer. Which type of report would he used to see which if a particular client still owe him money?



A) Ad hoc


B) Routine


C) Exception


D) Detailed


E) Key indicator

A) Ad hoc

Kennametal’s main problem with its ERP installation was _________.




A) it cost too much


B) it couldn’t upgrade the ERP system


C) it made their business processes less efficient


D) all of the above were problems Kennametal experienced

B) it couldn’t upgrade the ERP system

Which of the following statements is false?



A) Data consolidation and 360-degree view mean the same thing.


B) Data about customers in various functional areas was difficult to share.


C) Collaborative CRM systems enable customers to provide direct feedback to the organization.


D) CRM systems use a data warehouse to make all customer data available to every unit of the business.


E) Organizations can use blogs for customer input about their products and services.

A) Data consolidation and 360-degree view mean the same thing.

The sales, marketing, and service functions are part of:




A) CRM


B) analytical CRM


C) operational CRM


D) collaborative CRM


E) transactional CRM

C) operational CRM

_____ systems study customer behavior and perceptions to provide business intelligence.



A) CRM


B) Collaborative CRM


C) Operational CRM


D) Analytical CRM


E) Transactional CRM

D) Analytical CRM

The benefits of open-source CRM include all of the following except:



A) It is easy to customize


B) It is favorably priced


C) It has more functionality than in-house CRM systems


D) Updates and error fixes occur rapidly


E) It has extensive support information available


C) It has more functionality than in-house CRM systems

_____ is the time between the receipt of incoming goods and the dispatch of finished, outbound products.



A) Inventory turnover


B) Inventory velocity


C) Inventory speed


D) Inventory time


E) Inventory production

B) Inventory velocity

A company’s organization and processes for distributing and delivering products to its final customers is the:



A) suppliers’ chain


B) external supply chain


C) upstream portion of the supply chain


D) downstream portion of the supply chain


E) entire supply chain

D) downstream portion of the supply chain

Which of the following is not responsible for the bullwhip effect?



A) Poor demand forecast


B) Price fluctuations


C) Order batching


D) Rationing within the supply chain


E) Poor supply forecast

E) Poor supply forecast

Which of the following is not a limitation of EDI?



A) It is inflexible


B) Business processes may have to be restructured


C) It is expensive, but ongoing operating costs are low


D) Multiple EDI standards exist


E) It is difficult to make quick changes

C) It is expensive, but ongoing operating costs are low

Which of the following was NOT a problem Daimler AG’s had?




A) Consistent information


B) Information quality


C) Information silos


D) Lack of information

D) Lack of information

Decision makers construct a model for the situation in the ______ stage of the decision-making process.




A) Choice


B) Design


C) Implementation


D) Intelligence

B) Design

Computer support is greatest for which of the following problems?



A) semistructured and strategic planning


B) unstructured and operational control


C) structured and operational control


D) semistructured and management control


E) structured and management control

C) structured and operational control

A company wants to use data from past promotional mailings to identify people who would likely respond favorably to future mailings. This company would most likely use:




A) Structured query language


B) Multidimensional data analysis


C) Neural networks


D) Expert systems


E) Data mining

E) Data mining

Digital dashboards provide all of the following capabilities except:




A) Drill-down


B) Transaction processing


C) Status access


D) Key performance indicators


E) Exception reporting

B) Transaction processing

The information systems planning process proceeds in which order?





A) Organization mission – organization strategic plan – IS strategic plan – new IT architecture


B) Organization mission – IS strategic plan – organization strategic plan – IS operational plan


C) Organization strategic plan – organization mission – IS strategic plan – new IT architecture


D) IT architecture – IS strategic plan – organization strategic plan – organization mission


E) IS development projects – IS operational plan – new IT architecture – organization mission

A) Organization mission – organization strategic plan – IS strategic plan – new IT architecture

In ___________ conversion, a firm implements a new information system in one of its plants, assesses the new system’s performance, and then implements the new system in its other plants.




A) Phased


B) Direct


C) Parallel


D) Pilot

D) Pilot

Which of the following is not a part of the typical IS operational plan?




A) The mission of the IS function


B) The organizational mission


C) The IT architecture


D) The application portfolio


E) The IS function’s estimate of its goals

B) The organizational mission

As an MIS analyst, you have decided to use a prototyping methodology for a small, Web-based design project. What is the order of steps that you will follow in the project?



A) Develop the prototype; use the prototype; revise and enhance the prototype.


B) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype.


C) Develop the prototype; identify user requirements; use the prototype; revise and enhance the prototype.


D) Identify user requirements; develop solutions; select the best prototype; implement the prototype.


E) Identify user requirements; develop the prototype; revise and enhance the prototype.


B) Identify user requirements; develop the prototype; use the prototype; revise and enhance the prototype.

_____ is a software development methodology that delivers functionality in rapid iterations, usually measured in weeks.



A) Agile development


B) Prototyping


C) The systems development life cycle


D) Joint application development


E) Component-based development


A) Agile development

Anna works in the sales organization of a mid-size company. The company is evaluating whether it should replace its existing sales support system. At what stage of the SDLC should Anna expect to participate?



A) Systems analysis


B) Programming


C) Systems design


D) Prototyping


E) Feasibility study

A) Systems analysis

_________ continues throughout the life of the system.



A) Debugging


B) Implementation


C) Maintenance


D) Updating


A) Debugging

Evaluating the benefits of IT projects is more complex than evaluating their costs for all of the following reasons except:



A) Benefits are harder than costs to quantify.


B) Benefits tend to be more tangible than costs.


C) IT can be used for several different purposes.


D) The probability of obtaining a return from an IT investment is based on the probability of implementation success.


E) The proposed system may be “cutting edge.”

B) Benefits tend to be more tangible than costs.

The deliverable of the systems design stage is:




A) User requirements.


B) Technical system specifications.


C) The prototype.


D) The source code.


E) A working application.

B) Technical system specifications.

When systems are created rapidly, without a formal development methodology:




A) End users can take over the work of MIS analysts.


B) The organization quickly outgrows the new system.


C) Hardware, software, and quality standards are less important.


D) Testing and documentation may be inadequate.


E) The organization saves money.

D) Testing and documentation may be inadequate.

Agile development




A) Takes a long time.


B) Requires little user input.


C) Delivers functionality in rapid interactions.


D) Focuses on all required functionality at each step of the way.


E) Uses the scrum approach to design the system.

C) Delivers functionality in rapid interactions.

Ryan works for a small consulting company. They want to do a better job of tracking their clients and the jobs they have bid on and either won or lost. There are no processes in place right now, and all users (consultants and managers) have different ideas. What is the best systems development approach for Ryan’s company?




A) SDLC


B) Prototyping


C) JAD


D) Buy option


E) Object-oriented development

C) JAD

____________ involves a group meeting of all analysts and users who agree on system requirements.




A) Agile


B) JAD


C) RAD


D) Scrum

B) JAD

The ____________ ethical standard states that an ethical action is the one that provides the most good or does the least harm.




A) Common good


B) Fairness


C) Rights


D) Utilitarian


E) Well-being

D) Utilitarian

The _____________ ethical standard states that ethical actions treat all human beings equally.




A) Common good


B) Fairness


C) Rights


D) Utilitarian


E) Well-being

B) Fairness

_____________ means accepting the consequences of your decisions and actions.




A) Privacy


B) Responsibility


C) Transferability


D) Accountability


E) Liability

B) Responsibility

Shelli runs a small boutique in Tel Aviv. She has built up a very nice client base and regularly sends her clients a newsletter. She keeps all her client data on her laptop in a password-protected file. Her decision to protect the file reflects which ethical issue related to IT?



A) Privacy


B) Accuracy


C) Accountability


D) Property (such as intellectual property)


E) Accessibility to information

E) Accessibility to information

Which of the following is false about WikiLeaks?



A) Anyone can submit files to WikiLeaks.



B) The most controversial expose involved the U.S. government.



C) Governments and companies are using network forensics to identify intruders who break into systems.



D) Because of WikiLeaks, governments and companies are trying to use data leak prevention software to prevent unauthorized downloads.



E) WikiLeaks is legally protected in the U.S. because it is merely a conduit for the documents.

C) Governments and companies are using network forensics to identify intruders who break into systems.

Which of the following is false about Facebook’s privacy polices?



A) Facebook puts the responsibility of privacy in the hands of the user.



B) Facebook as an “off switch” that lets users block all access to their information from third-party applications and Web sites.



C) Facebook’s CEO feels that privacy is no longer a social norm.



D) Facebook created new “buckets” that could be designated to groups of people.



E) Facebook uses an Opt-in model.

E) Facebook uses an Opt-in model.