Category: Tag:




Final Exam # 1

1) Which of the following statements is not correct?

A. Information technology (IT) enables organizations to survive in the face of business pressures.

B. IT requires small investments over a long period of time.

C. Organizations may leverage their platforms to develop web-based applications, products, and services.

D. To succeed in today’s environment, it is often necessary to change business models and strategies.


2) The fact that you practice continuous computing means all of the following except:

A. You can pull information about almost everything from anywhere all the time.

B. You can push your ideas to the web.

C. Your daily routines are exactly the same as students 20 years ago, but you do your tasks much slower and with more effort.

D. You are surrounded by a movable information network.


3)  _____ conveys understanding, accumulated learning, and expertise as they apply to a current problem.

A. Information

B. Knowledge

C. Experience

D. Data


4) A set of programs that enable hardware to process data is _____.

A. software

B. database

C. network

D. hardware


5) What was the main problem of Chevron®’s IT organization?

A. Ability to innovate

B. Ability to execute large projects

C. Technical strength

D. Alignment between IT and business strategy


6) A collection of related files, tables, and so forth that stores data and the associations among them is _____.

A. hardware

B. database

C. software

D. network


7) The list of all your purchases from Amazon® would be:

A. data

B. knowledge

C. information

D. experience


8) If Amazon® uses a list of all your purchases to recommend other books to you, then Amazon® is applying its _____.

A. data

B. knowledge

C. information

D. experience


9) _____ is data that have been organized to have meaning and value to a recipient.

A. Data

B. Knowledge

C. Information

D. Experience


10) The end result of the data life cycle is the generation of _____.

A. information

B. knowledge

C. data

D. wisdom


11) What is the most significant benefit of Panasonic®’s new data management system?

A. Cost savings

B. Reduced time required for creating and maintaining product information

C. Improved time-to-market for products

D. Company moved from push inventory model to pull model


12) When customers access a website and make purchases, they generate _____:

A. tracking cookies

B. clickstream data

C. information

D. web data


13)  _____ occurs when various copies of the data agree.

A. Data redundancy

B. Data integrity

C. Data isolation

D. Data consistency


14) In the data hierarchy, the smallest element is the _____.

A. character

B. bit

C. record

D. byte


15)  _____ occurs when applications cannot access data associated with other applications.

A. Data redundancy

B. Data integrity

C. Data isolation

D. Data consistency


16) A _____ is a logical grouping of characters into a word, a small group of words, or a complete number.

A. file

B. field

C. byte

D. record


17)  _____ are fields in a record that have some identifying information but typically do not identify the record with complete accuracy.

A. Attribute keys

B. Secondary keys

C. Primary keys

D. Duplicate keys


18) The data in a data warehouse have which of the following characteristics?

A. Typically retained for a defined, but limited, period of time

B. Coded in different formats

C. Organized by subject

D. Updated in real time


19) The nature of business competition is changing drastically as a result of all of the following except:

A. Companies having difficulty integrating their physical and electronic channels

B. The diversity of electronic commerce-related products and services

C. New online companies

D. The increase in the number of digitizable products


20) J&R Electronics® made a commitment to electronic commerce for all of the following reasons except:

A. The company was slow to pick up on technology trends.

B. The company could leverage its knowledgeable sales staff.

C. The company had only the one physical store.

D. The company was limited by geography.


21) J&R Electronics®’ biggest problem was which of the following?

A. The company’s sales staff was not knowledgeable enough about the company’s products.

B. The company had a limited range of products.

C. The company was limited by its physical location.

D. The company had too many products, which confused customers with too many choices.


22) The characteristics of ERP systems include all of the following except:

A. Include a set of interdependent software modules

B. Provide information necessary to control the business processes of the organization

C. Typically fit an organization’s existing business processes

D. Integrate the planning, management, and use of all resources of the organization


23) _____ are the most successful solutions or problem-solving methods for achieving a business objective.

A. Optimal strategies

B. Best practices

C. Business processes

D. Business functions


24) International Game Technology®’s new ERP system produced all of the following benefits except:

A. ERP system connected the company’s global operations

B. Company maintained its original business processes

C. Company gained flexibility in manufacturing products

D. Integrated the company’s business functions


25) Organizational transactions are typically _____ volume, _____, and _____ to computerize.

A. high, different, difficult

B. high, repetitive, easy

C. low, different, easy

D. low, repetitive, difficult


26) Which of the following is not a characteristic of a transaction processing system?

A. Low computation complexity

B. Mainly internal sources of data

C. High level of accuracy, data integrity, and security

D. Small amounts of data processed


27) Which of the following is not a function of functional area IS?

A. Provides information mainly in reports

B. Supports the managerial tasks of planning, organizing, and controlling operations

C. Provides data from business events to the corporate database

D. Provides information to managers in the functional areas


28) A _____ refers to the flow of materials, information, money, and services from raw material suppliers, through factories and warehouses, to the end customers.

A. manufacturing process

B. business process

C. supply chain

D. demand chain


29) Customer relationship management is based on a simple idea: treat _____ customers _____.

A. bad, poorly

B. good, well

C. all, the same

D. different, differently


30) AT&T® sells telephone services that include local and long-distance service, voicemail service, caller ID, and digital subscriber line access to the Internet. This is a form of:

A. Bundling

B. Cross-selling

C. Customer relationship management

D. Up-selling


31) The _____ refers to erratic shifts in orders up and down the supply chain.

A. supply forecast effect

B. bullwhip effect

C. demand forecast effect

D. inventory effect


32) Distribution or dispersal takes place in which segment of the supply chain?

A. Internal

B. Downstream

C. Upstream

D. External


33) A company’s suppliers, suppliers’ suppliers, and the processes for managing them is the:

A. External supply chain

B. Upstream portion of the supply chain

C. Suppliers’ chain

D. Downstream portion of the supply chain


34) Being an entrepreneur, disturbance handler, and negotiator is part of the _____ managerial role.

A. entrepreneurial

B. informational

C. interpersonal

D. decisional


35) The overall strategy of Eastern Mountain Sports® is

A. Customer satisfaction

B. Rapid expansion of brick-and-mortar stores

C. Cost containment

D. Revenue growth


36) _____ is the process by which organizational goals are achieved through the use of organizational resources.

A. Operations

B. Organizational strategy

C. Organizational decision-making

D. Management


37) The _____ method measures the effectiveness of management in generating profits with its available assets.

A. cost-benefit analysis

B. return on investment

C. net present value

D. internal rate of return


38) The _____ method converts future values of benefits to today’s value by discounting them at the organization’s cost of funds.

A. cost-benefit analysis

B. return on investment

C. net present value

D. internal rate of return


39) Evaluating the benefits of IT projects is more complex than evaluating the costs for all of the following reasons except

A. Benefits are harder to quantify.

B. IT may be used for several different purposes.

C. Probability of obtaining a return from an IT investment is based on the probability of implementation success.

D. Benefits are often tangible.


40) Success in the _____ phase of the decision-making process results in resolving the original problem, and failure leads to a return to previous phases.

A. implementation

B. design

C. intelligence

D. choice


41) _____ is the efficient and effective execution of specific tasks.

A. Operational control

B. Strategic planning

C. Expertise

D. Management control


42) Which of the following is not a reason that managers need IT support?

A. Number of alternatives are decreasing

B. Decisions becoming more complex

C. Need to access remote information sources

D. Decisions made under pressure


43) The _____ that changes are made in the systems development life cycle, the _____ expensive the changes become.

A. sooner, less

B. more frequently, more

C. more extensively, more

D. later, less


44) Which of the following systems acquisition methods results in software controlled by another company, may be difficult to enhance or modify, and may not support desired business processes?

A. Systems development life cycle

B. End-user development

C. Buy option

D. Prototyping


45) Which of the following systems acquisition methods is time-consuming, costly, and may produce excessive documentation?

A. Traditional systems development life cycle

B. End-user development

C. External acquisition

D. Prototyping


46) Which of the following statements is correct?

A. An individual’s right to privacy is absolute.

B. An individual’s right to privacy supersedes the needs of society.

C. Advances in information technologies have not affected individual privacy.

D. It is difficult to determine and enforce privacy regulations.


47) How does society keep owners of electronic bulletin boards from disseminating offensive or untrue content? This is a difficult question because it involves the conflict between _____ on one hand, and _____ on the other.

A. privacy, freedom of speech

B. freedom of speech, privacy

C. ethics, freedom of speech

D. freedom of speech, ethics


48) Which of the following statements is not correct?

A. As with normal first-class mail, employers cannot read employee e-mail.

B. The large majority of organizations monitor employee Internet usage.

C. Employees have limited protection against surveillance by employers.

D. The large majority of organizations use web filtering.


49) Gillette® tested radio-frequency identification (RFID) at only 400 stores and four distribution centers for all of these reasons except:

A. To study the sweet spot where the RFID tag is placed

B. To minimize risk

C. To keep costs to a minimum

D. To handle the flood of data


50) Of the following, which is the major problem with smartphones?

A. Their screens are too small.

B. They are too expensive.

C. They are too slow.

D. They may be used to compromise security.


51) Unfortunately, many managers consider smartphones as only _____, rather than as _____ that can transmit wirelessly.

A. digital cameras, pagers

B. phones, pagers

C. phones, digital cameras

D. digital cameras, phones


52) Your company’s computers have been taken over by an attacker and used to attack another organization’s IS. Your problem is which of the following?

A. Poor service-level agreements

B. Lack of due diligence

C. Poor security policies and procedures

D. Downstream liability


53) What is _____ is not necessarily _____.

A. unethical, legal

B. ethical, illegal

C. illegal, unethical

D. unethical, illegal


54) _____ involves building an inappropriate trust relationship with employees for the purpose of gaining sensitive information or unauthorized access privileges.

A. Social engineering

B. Hacking

C. Reverse social engineering

D. Spoofing


Six additional Final Exams are also attached.