Вы находитесь на странице: 1из 69

1.

Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system. Student Response True General Feedback: Score:
2.

Value 100%

Correct Answer True

Textbook: p. 487 1/1

Rationalization of procedures describes a radical rethinking of the business models. Student Response False Score:
3.

Value 100%

Correct Answer False

1/1

Prototyping is more iterative than the conventional lifecycle. Student Response True Score:
4.

Value 100%

Correct Answer True

1/1

A data flow diagram offers a logical and graphical model of information flow, partitioning a system into modules that show manageable levels of detail. Student Response True Value 100% Correct Answer True

General Feedback: Score:


5.

Textbook: p. 497 1/1

The traditional approach to systems development (i.e., the waterfall model and its variations) relies on extensive upfront planning as the basis for predicting, m controlling problems and variations during the development process. Student Response True General Feedback: Score:
6.

Value 100%

Correct Answer True

The assigned reading materials "Agile methodologies" 1/1

Enabling organizations to make continual improvements to many business processes and to use processes as the fundamental building blocks of corporate inf the goal of: Student Response Value A. BPM. B. BPR. C. Reengineering. D. Work flow management. General Feedback: Score:
7.

Correct Answer

Feedback

100%

Textbook: p. 487 1/1

Which process develops a detailed description of the functions that a new information system must perform? Student Response Value A. Feasibility study B. Requirements analysis C. Systems design D. Test plan development Score:
8.

Correct Answer

Feedback

100%

1/1

The entire system-building effort is driven by: Student Response Value A. organizational change. B. feasibility studies. C. the information value chain. D. user information requirements. General Feedback: Score:
9.

Correct Answer

Feedback

100%

Textbook: p. 491 1/1

Transferring transaction data from a legacy system to the new system would be defined by which category of system design specifications?

Student Response Value A. Input B. Database C. Manual procedures D. Conversion General Feedback: Score:
10.

Correct Answer

Feedback

100%

Textbook: p. 491 1/1

Unit testing: Student Response Value A. includes all the preparations for the series of tests to be performed on the system. B. tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C. tests each program 100% separately. D. provides the final certification that the system is ready to be used in a production setting. Correct Answer Feedback

General Feedback: Score:


11.

Textbook: p. 492 1/1

In systems development, acceptance testing: Student Response Value A. includes all the preparations for the trials. B. tests the functioning of the system as a whole in order to determine if discrete modules will function together as planned. C. tests each program separately. D. provides the final 100% certification that the system is ready to be used in a production setting. Score:
12.

Correct Answer

Feedback

1/1

In a parallel conversion strategy, the new system: Student Response Value A. is tested by an Correct Answer Feedback

Student Response Value outsourced company. B. replaces the old one at an appointed time. C. and the old are run 100% together. D. is introduced in stage. General Feedback: Score:
13.

Correct Answer

Feedback

Textbook: p. 495 1/1

Changes in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficien Student Response Value A. compliance. B. production. C. maintenance. D. acceptance. General Feedback: Score:
14.

Correct Answer

Feedback

100%

Textbook: p. 496 1/1

The primary tool for representing a systems component processes and the flow of data between them is the:

Student Response Value A. data dictionary. B. process specifications diagram. C. user documentation. D. data flow diagram. 100% General Feedback: Score:
15.

Correct Answer

Feedback

Textbook: p. 497 1/1

In what stage of systems development are design specifications created? Student Response Value A. Systems analysis B. Systems design C. Testing D. Conversion General Feedback: Score:
16.

Correct Answer

Feedback

100%

Textbook: p. 496 1/1

In an object-oriented development framework for a university, how would the classes Degree, Mathematics, and Physics be related? Student Response Value A. Degree would be a Correct Answer Feedback

Student Response Value sister class to Mathematics and Physics B. Degree is a superclass to Mathematics and Physics C. Mathematics and Physics would be ancestors to Degree D. Degree would be a subclass to Mathematics and Physics General Feedback: Score:
17.

Correct Answer

Feedback

100%

Textbook: p. 499 1/1

In systems development, object-oriented modeling is based on the concepts of: Student Response Value A. objects and relationships. B. classes and objects. C. class and inheritance. D. objects and inheritance. Score: 1/1 100% Correct Answer Feedback

18.

The oldest method for building information systems is the: Student Response Value A. component-based development. B. prototyping. C. object-oriented development. D. systems development lifecycle. General Feedback: Score:
19.

Correct Answer

Feedback

100%

Textbook: p. 501 1/1

In which type of systems building are the development stages organized so that tasks in one stage are completed before the tasks in the next stage begun? Student Response Value A. Traditional B. Prototyping C. RAD D. Agile E. All of the above Score:
20.

Correct Answer

Feedback

100%

1/1

As a technical project manager you have decided to propose implementing a prototyping methodology for a small Web-based design project. What is the orde follow in this project? Student Response Value A. Develop the prototype; use the prototype; revise and enhance the prototype. B. Identify user requirements, develop the prototype, use the prototype, revise and enhance the prototype. C. Define the requirements, develop solutions, select the best prototype, and implement the prototype. D. Define the requirements, develop the prototype, revise and enhance the prototype. Score:
21.

Correct Answer

Feedback

100%

1/1

Fourth-generation tools cannot replace conventional development tools because:

Student Response Value A. they cannot handle 100% large numbers of transactions or extensive procedural logic. B. they are not designed to integrate with legacy systems. C. they do not incorporate methods for documentation. D. they do not incorporate methods for testing. General Feedback: Score:
22.

Correct Answer

Feedback

Textbook: p. 504 1/1

"Hidden costs" such as ____________ can easily undercut anticipated benefits from outsourcing. Student Response Value A. monitoring vendors to make sure they often are fulfilling their contractual obligations B. transitioning to a new vendor C. identifying and Correct Answer Feedback

Student Response Value evaluating vendors of information technology services D. all of the above General Feedback: Score:
23.

Correct Answer

Feedback

100%

Textbook: p. 506 1/1

You are an IT project manager for an advertising firm. The firm wishes to create an online tool that will be used to survey focus group reactions to products i most important consideration for the firm is being able to offer the tool as soon as possible as a new corporate service. However, you know that many of the s that are business owners of this project have difficulty in understanding technical or software development issues, and are likely to change their requirements of development. What development method would be most successful for this project? Student Response Value A. RAD B. JAD C. End-user development D. Prototyping General Feedback: Score:
24.

Correct Answer

Feedback

100%

Textbook: see the discussion on p501-510 1/1

The following statement about agile methodologies are correct EXCEPT: Student Response Value A. Agile methodologies are Correct Answer Feedback

Student Response Value B. Users are deeply involved in the development process. 100% C. Agile methodologies favor a command-andcontrol style of management where the project manager's role is that of a planner and controller. D. Team members are not confined to a specialized role. E. Agile methodologies cut down documentation to save time and speed up development process. General Feedback: Score:

Correct Answer

Feedback

The assigned reading materials "Agile methodologies" 1/1

1.

An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals. Student Response True Value 100% Correct Answer True

Score:
2.

1/1

If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision. Student Response True General Feedback: Score:
3.

Value 100%

Correct Answer True

10th: p. 559 11th: p. 528 1/1

Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information system Student Response True General Feedback: Score:
4.

Value 100%

Correct Answer True

10th: p. 565 11th: p. 533 1/1

More timely information is a tangible benefit of information systems. Student Response False General Feedback: Score:
5.

Value 100%

Correct Answer False

10th: p. 566 11th: p. 566 1/1

User concerns and designer concerns are usually the same at the beginning of the project but may diverge later as the system is built. Student Response False Score:
6.

Value 100%

Correct Answer False

1/1

The major variables in project management are: Student Response Value A. scope, time, cost, and performance. B. scope, time, cost, quality, and risk. C. time, cost, quality, performance, and risk. D. time, cost, scope, and performance. General Feedback: Score:
7.

Correct Answer

Feedback

100%

10th: P. 556 11th: p. 524 1/1

A road map indicating the direction of systems development, the rationale, the current systems, new developments to consider, the management strategy, the plan, and the budget is called a(n): Student Response Value A. project plan. Correct Answer Feedback

Student Response Value B. portfolio analysis. C. information systems 100% plan. D. enterprise analysis. General Feedback: Score:
8.

Correct Answer

Feedback

10th: P. 559 11th: p. 528 1/1

The principle method used in CFS analysis is to Student Response Value A. inventory all of the organization's information systems projects and assets and assign risk levels. B. perform a weighted comparison of the criteria used to evaluate a system. C. survey a large sample of managers on their objectives, decision-making process, and uses and needs for data and information. D. interview a small number of top 100% Correct Answer Feedback

Student Response Value managers to identify their goals and criteria for achieving success. Score:
9.

Correct Answer

Feedback

1/1

The central method used in a scoring model is to: Student Response Value A. perform a weighted 100% comparison of the criteria used to evaluate a system. B. inventory all of the organizations information systems projects and assets. C. survey a large sample of managers on their objectives, decision-making process, and uses and needs for data and information. D. interview a small number of top managers to identify their goals and criteria for achieving success. Score: 1/1 Correct Answer Feedback

10.

Which method is used to develop risk profiles for a firms information system projects and assets? Student Response Value A. Information systems plan B. Scoring model C. Portfolio analysis D. CSF General Feedback: Score:
11.

Correct Answer

Feedback

100%

10th: p. 563 11th: p. 530 1/1

The criteria used for evaluation in a scoring model are usually determined by: Student Response Value A. lengthy discussions 100% among the decisionmaking group. B. a CSF analysis. C. the IS steering committee. D. systems analysts. General Feedback: Score: 10th: p. 564 11th: p. 531 1/1 Correct Answer Feedback

12.

_________ are all tangible benefits of information systems. Student Response Value A. Improved asset utilization, increased organizational learning, and improved operations B. Reduced workforce, 100% lower outside vendor costs, and increased productivity C. Increased productivity, reduced workforce, and increased job satisfaction D. Lower operational costs, improved resource control, and more information Score:
13.

Correct Answer

Feedback

1/1

To best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use: Student Response Value A. capital budgeting. B. real option pricing 100% Correct Answer Feedback

Student Response Value model. C. scoring model. D. net present value. General Feedback: Score:
14.

Correct Answer

Feedback

10th: p. 571 11th: p. 534 1/1

The level of a projects risk is influenced primarily by: Student Response Value A. project size, project 100% structure, and the level of technical expertise. B. project cost, project scope, and the implementation plan. C. project scope, project schedule, and project budget. D. project size, project scope, and the level of technical expertise. General Feedback: Score: 10th: p. 572 11th: p. 535-536 1/1 Correct Answer Feedback

15.

Which of the following is not one of the activities of the systems analyst: Student Response Value A. acting as a change agent. B. communication with users. C. mediating between competing interest groups. D. formulation of capital budgeting models. Score:
16.

Correct Answer

Feedback

100%

1/1

The communications gap between users and systems designers is created by their differences in: Student Response Value A. backgrounds. B. interests. C. priorities. D. all of the above. General Feedback: Score:
17.

Correct Answer

Feedback

100%

10th: p. 573 11th: P. 537 1/1

Which type of planning tool shows each task as a horizontal bar whose length is proportional to the time required to complete it? Student Response Value A. PERT chart B. Gantt chart C. critical path analysis. D. node network analysis General Feedback: Score: 10th: p. 575 11th: p. 539 1/1 100% Correct Answer Feedback

1.

Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines. Student Response True General Feedback: Score:
2.

Value 100%

Correct Answer True

10th: p. 317 11th: p. 296 1/1

Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer. Student Response False Score: 1/1 Value 100% Correct Answer False

3.

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Student Response True General Feedback: Score:
4.

Value 100%

Correct Answer True

10th: p. 321 11th: p. 302 1/1

Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports. Student Response True Score:
5.

Value 100%

Correct Answer True

1/1

A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Student Response True Score:
6.

Value 100%

Correct Answer True

1/1

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers.

Student Response False General Feedback: Score:


7.

Value 100%

Correct Answer False

10th: p. 361 11th: p. 343 1/1

In a push-based model, actual customer orders or purchases trigger events in the supply chain. Student Response False General Feedback: Score:
8.

Value 100%

Correct Answer False

10th: p. 366 11th: p. 350 1/1

Dell Computer's build-to-order system is an example of a pull-based model. Student Response True Score:
9.

Value 100%

Correct Answer True

1/1

Enterprise systems require fundamental changes in the way the business operates. Student Response True Score: 1/1 Value 100% Correct Answer True

10.

Electronic data are more susceptible to destruction, fraud, error, and misuse because information systems concentrate data in computer files that Student Response Value A. are usually embedded in legacy systems that are easy to access. B. are not secure because the technology to secure them did not exist at the time the files were created. C. have the potential to be accessed by large numbers of people and by groups outside of the organization. D. are frequently available on the Internet. General Feedback: Score:
11.

Correct Answer

Feedback

0%

10th: p. 316-317 11th: p. 295-296 0/1

Specific security challenges that threaten corporate servers in a client/server environment include Student Response Value A. tapping; sniffing; message alteration; Correct Answer Feedback

Student Response Value radiation. B. hacking; vandalism; 100% denial of service attacks. C. theft, copying, alteration of data; hardware or software failure. D. unauthorized access; errors; spyware. General Feedback: Score:
12.

Correct Answer

Feedback

10th: p. 316 11th: p. 295 1/1

An independent computer program that copies itself from one computer to another over a network is called a: Student Response Value A. worm. B. Trojan horse. C. bug. D. virus. Score:
13.

Correct Answer

Feedback

100%

1/1

In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendors site, a small program called Mitglieder was downloa machine. The program enabled outsiders to infiltrate the users machine. What type of malware is this an example of?

Student Response Value A. Virus B. Worm C. Spyware D. Trojan horse General Feedback: Score:
14.

Correct Answer

Feedback

100%

10th: p. 320 11th: p. 301 1/1

Redirecting a Web link to a different address is a form of: Student Response Value A. snooping B. spoofing C. sniffing D. phishing General Feedback: Score:
15.

Correct Answer

Feedback

100%

10th: p. 321 11th: p. 302 1/1

Using numerous computers to inundate and overwhelm the network from numerous launch points is called: Student Response Value A. spamming B. spoofing Correct Answer Feedback

Student Response Value C. DDoS D. cybervandalism Score:


16.

Correct Answer

Feedback

100%

1/1

How do hackers create a botnet? Student Response Value A. Infecting Web shopping bots with malware B. Using Web search bots to infect other computers 100% C. Causing other peoples computers to become "zombie" PCs following a master computer D. Infecting corporate servers with zombie Trojan horses that allow undetected access through a back door General Feedback: Score:
17.

Correct Answer

Feedback

10th: p. 322 11th: p. 303 1/1

Phishing involves: Student Response Value A. redirecting users to a fraudulent Web site even when the user has typed in the correct address in the Web browser. B. pretending to be a legitimate businesss representative in order to garner information about a security system. C. using e-mails for threats or harassment. D. setting up fake Web 100% sites to ask users for confidential information. General Feedback: Score:
18.

Correct Answer

Feedback

10th: p. 325 11th: p. 304 1/1

How do software vendors correct flaws in their software after it has been distributed? Student Response Value A. Issue bug fixes. B. Issue patches. 100% Correct Answer Feedback

Student Response Value C. Re-release software. D. Issue updated versions. General Feedback: Score:
19.

Correct Answer

Feedback

10th: p. 327 11th: p. 307 1/1

The most common type of electronic evidence is: Student Response Value A. word-processing documents. B. spreadsheets. C. instant messages. D. e-mail. Score:
20.

Correct Answer

Feedback

100% 1/1

Analysis of an information system that rates the likelihood of a security incident occurring and its cost is included in a(n): Student Response Value A. security policy. B. AUP. C. risk assessment. D. business impact analysis. 100% Correct Answer Feedback

General Feedback: Score:


21.

10th: p. 330 11th: p. 311 1/1

Downtime refers to periods of time in which: Student Response Value A. a computer system 100% is not operational. B. a computer system is malfunctioning. C. a corporation is not operational. D. a computer is not able to perform online transactions. General Feedback: Score:
22.

Correct Answer

Feedback

10th: p. 333 11th: p. 321 1/1

High-availability computing: Student Response Value A. promises continuous availability. B. promises the elimination of recovery time. C. uses online Correct Answer Feedback

Student Response Value transaction and backup systems. D. helps firms recover 100% quickly from a crash. General Feedback: Score:
23.

Correct Answer

Feedback

10th: p. 333 11th: p. 321-322 1/1

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key? Student Response Value A. SSL B. Symmetric key encryption C. Public key encryption D. Private key encryption Score:
24.

Correct Answer

Feedback

100%

1/1

A suite of integrated software modules for finance and accounting, human resources, manufacturing and production, and sales and marketing that allows data multiple functions and business processes best describes: Student Response Value A. process management Correct Answer Feedback

Student Response Value software. B. ERP systems. C. groupware. D. application software. Score:
25.

Correct Answer

Feedback

100%

1/1

This type of software enables data to be used by multiple functions and business processes for organization coordination and control: Student Response Value A. groupware. B. application software. C. collaboration software. D. enterprise software. 100% Score:
26.

Correct Answer

Feedback

1/1

You have been asked to implement enterprise software for a manufacturer of kitchen appliances. What is the first step you should take? Student Response Value A. Select the functions 100% of the system you wish to use. B. Map the companys Correct Answer Feedback

Student Response Value business processes to the softwares business processes. C. Map the softwares business processes to the companys business processes. D. Select the business processes you wish to automate. Score:
27.

Correct Answer

Feedback

1/1

In order to achieve maximum benefit from an enterprise software package, a business: Student Response Value A. customizes the software to match all of its business processes. B. uses only the processes in the software that match its own processes. C. changes the way it works to match the softwares business processes. D. selects only the software that best matches its existing business processes. 0% Correct Answer Feedback

Score:
28.

0/1

A company's suppliers, supplier's suppliers, and the processes for managing relationships with them is the Student Response Value A. supplier's internal supply chain. B. external supply chain. C. upstream portion of 100% the supply chain. D. downstream portion of the supply chain. General Feedback: Score:
29.

Correct Answer

Feedback

10th: p. 361 11th: p. 343 1/1

A scheduling system for minimizing inventory by having components arrive exactly at the moment they are needed and finished goods shipped as soon as the assembly line best describes which strategy: Student Response Value A. just-in-time strategy. B. stockless inventory. C. ASAP inventory. D. replenishment-only inventory. Score: 1/1 100% Correct Answer Feedback

30.

A distortion of information about the demand for a product as it passes from one entity to the next across the supply chain is called: Student Response Value A. bullwhip effect. B. ripple effect. C. replenishment effect. D. exponential effect. Score:
31.

Correct Answer

Feedback

100%

1/1

A supply chain driven by actual customer orders or purchases follows a: Student Response Value A. pull-based model B. build-to-stock model C. push-based model D. replenishmentdriven model General Feedback: Score:
32.

Correct Answer

Feedback

100%

10th: p. 366 11th: p. 350 1/1

A ________ is a method of interaction with a customer, such as telephone or customer service desk.

Student Response Value A. point of presence. B. touch point. C. market entry. D. purchase point. General Feedback: Score:
33.

Correct Answer

Feedback

100%

10th: p. 369 11th: p. 353 1/1

Customer relationship management applications dealing with the analysis of customer data to provide information for improving business performance best d Student Response Value A. operational customer relationship management applications. B. supply chain management applications. C. analytical customer 100% relationship management applications. D. generic customer relationship management applications. General Feedback: 10th: p. 374 11th: p. 359 Correct Answer Feedback

Score:
34.

1/1

Which type of enterprise application or technique would help you best identify hidden buying patterns of your customers? Student Response Value A. OLAP using a SCM system B. Data mining using a 100% CRM system C. Predictive analysis using a PRM system D. None of the above Score:
35.

Correct Answer

Feedback

1/1

Which of the following is NOT true about enterprise systems? Student Response Value A. Enterprise systems help firms respond rapidly to customer requests for information or products. B. Enterprise system data have standardized definitions and formats that are accepted by the entire organization. Correct Answer Feedback

Student Response Value C. Enterprise software 100% is expressly built to allow companies to mimic their unique business practices. D. Enterprise software includes analytical tools to evaluate overall organizational performance. General Feedback: Score:

Correct Answer

Feedback

Enterprise software is built around thousands of predefined business processes that reflect best in industry practices. 1/

1.

Knowledge residing in the minds of employees that has not been documented is called explicit knowledge. Student Response False General Feedback: Score:
2.

Value 100%

Correct Answer False

see the textbook (12th edition) p. 417 1/1

Knowledge workers include all of a company's workers who are tasked with managing or creating knowledge, from top-level scientists to clerical and data workers.

Student Response True General Feedback: Score:


3.

Value 0%

Correct Answer False

See the textbook (12th edition) page 426 0/1

Expert systems work by applying a set of AND/OR rules against a knowledge base, both of which are extracted from human experts. Student Response True General Feedback: Score:
4.

Value 0%

Correct Answer False

See the textbook (12th edition) page 432 0/1

Case-based reasoning is not well-suited for diagnostic systems in medicine. Student Response False Score:
5.

Value 100%

Correct Answer False

1/1

Fuzzy logic can describe a particular phenomenon or process linguistically and then represent that description in a small number of flexible rules. Student Response True General See the textbook (12th edition) page 436 Value 100% Correct Answer True

Feedback: Score:
6.

1/1

Restaurant chains are among the elite group of companies across all industries that are actually getting real value from using business intelligence (BI) systems. Student Response True General Feedback: Score:
7.

Value 100%

Correct Answer True

See the reading material of "BI and fast food" 1/1

Expertise and experience of organizational members that has not been formally documented best describes: Student Response Value A. wisdom. B. information. C. data. D. tacit knowledge. General Feedback: Score:
8.

Correct Answer

Feedback

100%

See the textbook (12th edition) page 417 1/1

Changing organizational behavior by sensing and responding to new experience and knowledge is called:

Student Response Value A. organizational learning. B. the knowledge value chain. C. knowledge networking. D. change management. General Feedback: Score:
9.

Correct Answer

Feedback

100%

See the textbook (12th edition) page 419 1/1

Informal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests are called: Student Response Value A. communities of practice. B. communities of professionals. C. communities of interest. D. communities of knowledge. General Feedback: Score:
10

Correct Answer

Feedback

100%

See the textbook (12th edition) page 421 1/1

According to our book, which of the following are major types of knowledge management systems? Student Response Value A. Management information systems, decision support systems, and transaction processing systems. B. Enterprise systems, customer support systems, and supply chain management systems. C. Database management systems, expert systems, and knowledge work systems. 100% D. Enterprise-wide knowledge management systems, knowledge work systems, and intelligent techniques. General Feedback: Score:
11

Correct Answer

Feedback

See the textbook (12th edition) page 421 1/1

Fuzzy logic is a type of: Student Response Value A. data mining. B. neural network. C. intelligent technique. D. business intelligence. General Feedback: Score:
12

Correct Answer

Feedback

100%

See the textbook (12th edition) page 435 1/1

Which of the following is not a Web 2.0 tool firms are using to foster collaboration? Student Response Value A. Blogs B. Wikis C. Social bookmarking D. Intranets E. All of the above are 0% Web 2.0 tools that firms are using to foster collaboration. General Feedback: Score: See the textbook (12th edition) page 424 0/1 Correct Answer Feedback

13

CAD workstations: Student Response Value A. provide engineers, 100% designers, and factory managers with precise control over industrial design and manufacturing. B. provide an important source of expertise for organizations. C. allow groups to work together on documents. D. are high-end PCs used in the financial sector to analyze trading situations instantaneously and facilitate portfolio management. General Feedback: Score:
14

Correct Answer

Feedback

See the textbook (12th edition) page 427 1/1

Which of the following would not be classified as a knowledge work system? Student Response Value A. Computer-aided design B. expert system C. 3D visualization system D. Investment workstations General Feedback: Score:
15

Correct Answer

Feedback

100%

See the textbook (12th edition) page 427-431 1/1

Technology that consists of computer-based systems that attempt to emulate human behavior is called: Student Response Value A. fuzzy logic. B. neural networks. C. AI technology. D. genetic algorithms. General Feedback: Score:
16

Correct Answer

Feedback

100%

See the textbook (12th edition) page 431 1/1

An inference engine is: Student Response Value A. a strategy for searching the rule base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy used to 100% search through the rule base in an expert system by forward chaining or backward chaining. General Feedback: Score:
17

Correct Answer

Feedback

see the textbook (12th edition) p. 432 1/1

Forward chaining is: Student Response Value A. a strategy for searching the rule 100% Correct Answer Feedback

Student Response Value base in an expert system that begins with information entered by the user. B. the programming environment of an expert system. C. a method of organizing expert system knowledge into chunks. D. a strategy for searching the rule base in an expert system that begins with a hypothesis. General Feedback: Score:
18

Correct Answer

Feedback

see the textbook (12th edition) page 432 1/1

It is unlikely you could represent the knowledge in the Encyclopedia Britannica with an expert system because: Student Response Value A. there is no one expert who understands all the material contained within the encyclopedia. B. the knowledge Correct Answer Feedback

Student Response Value changes radically over a short time. C. not all the knowledge in the encyclopedia can be represented in the form of IF-THEN rules. D. the knowledge is too general. General Feedback: Score:
19

Correct Answer

Feedback

0%

see the textbook (12th edition) p. 432-434 0/1

Expert systems are expensive and time-consuming to maintain: Student Response Value A. because their rule base is so complex. B. because they rely on equipment that becomes outdated. C. because their rules 100% must be reprogrammed every time there is a change in the environment, which in turn may change the applicable rules Correct Answer Feedback

Student Response Value D. because only the person who created the system knows exactly how it works, and may not be available when changes are needed. General Feedback: Score:
20

Correct Answer

Feedback

see the textbook (12th edition) p. 434 1/1

Hardware and software that attempts to emulate the processing patterns of the biological brain best describes: Student Response Value A. neural network. B. expert system. C. case-based reasoning. D. fuzzy logic. General Feedback: Score:
21

Correct Answer

Feedback

100%

see the textbook (12th edition) p. 436 1/1

Software programs that work in the background without direct human intervention to carry out specific, repetitive, and predictable tasks for individual users, business processes, or software applications, are called:

Student Response Value A. intelligent techniques. B. business intelligence. C. intelligent agents. D. AI hybrid systems. General Feedback: Score:
22

Correct Answer

Feedback

100%

see the textbook (12th edition) p. 441 1/1

You are an automotive engineer working on an application that will automatically parallel park a car. The intelligent technique you may find most useful is Student Response Value A. case-based reasoning. B. artificial intelligence. C. fuzzy logic. D. expert system. E. decision support system. General Feedback: Score: see the textbook (12th edition) page 434-436 0/1 0% Correct Answer Feedback

23

Which of the following describes a difference between neural networks and genetic algorithms? Student Response Value A. Genetic algorithms are designed to process large amounts of information. B. Genetic algorithms are a type of knowledge discovery, while neural networks are an intelligent technique. C. Neural networks are 100% programmed to "learn." D. All of the above. General Feedback: Score:
24

Correct Answer

Feedback

See the textbook (12th edition) page 436-441 1/1

To automate routine tasks to help firms search for and filter information for use in electronic commerce and supply chain management a firm would most likely use Student Response Value 1. intelligent agents. Correct Answer Feedback

Student Response Value 2. fuzzy logic systems. 3. virtual reality systems. 4. CAD systems. 5. expert systems. General Feedback: Score:
25

Correct Answer

Feedback

0%

See the textbook (12th edition) p. 441 0/1

Regarding the article of BI being used by the fast food industry, which one of the following is NOT one of the biggest barriers to a successful implantation and use of BI as concluded by the restaurant chains? Student Response Value A. voluminous amounts of irrelevant data B. poor data quality C. lack of management support D. user resistance General Feedback: Score:
26

Correct Answer

Feedback

0%

See the reading material of "BI and fast food" 0/1

Based on the article of BI being used by restaurant chains, the following tips help to implement and use a BI system EXCEPT: Student Response Value A. Analyze how executives make decisions. B. Consider what information executives need in order to facilitate quick, accurate decisions. C. Pay attention to data quality. D. Devise performance metrics that are most relevant to the business. E. Redesign business process to streamline operations. General Feedback: Score:
1.

Correct Answer

Feedback

100%

See the reading material of "BI and fast food"

Before you develop a corporate strategy and structure for globalization, a firm should determine the appropriate technology infrastructure. Student Response False Score: 1/1 Value 100% Correct Answer False

2.

With the growth of the Internet and reliable phone networks, skilled consultants are readily available to companies operating in global markets. Student Response True General Feedback: Score:
3.

Value 0%

Correct Answer False

10th: p. 600 11th: p. 559 0/1

One major telecommunications challenge in an international setting is making data flow seamlessly across networks shaped by disparate national standards. Student Response True Score:
4.

Value 100%

Correct Answer True

1/1

Legally, employers can check their employees' work emails (it is not discussed in the book. you may need to do some research before answering this question Student Response True General Feedback: Score:
5.

Value 100%

Correct Answer True

The general view is that if a computer and internet connection belong to the employer, the employer has the right to check and inspect their most companies about pretty specific about computer usage by employees on company time. There are certain rules that companies set forw or through memos that clearly outline what is acceptable and what isn't. 1/1

Advances in data storage have made routine violation of individual privacy more difficult.

Student Response False Score:


6.

Value 100%

Correct Answer False

1/1

Spyware is software that comes hidden in free downloadable software and can track your online movements. Student Response True General Feedback: Score:
7.

Value 100%

Correct Answer True

10th: p. 142-143 11th: p. 135 1/1

The major dimensions of international systems architecture include each of the following EXCEPT: Student Response Value A. the global environment. B. corporate global strategy. C. technology platform. D. transborder data flows. General Feedback: Score: 100% Correct Answer Feedback

10th: p. 597 11th: p. 556 1/1

8.

General cultural factors driving global business are: Student Response Value 100% A. global communication and transportation technologies, a global knowledge base, and global social norms. B. the development of global markets, political stability, and a global workforce. C. the rise of the global workforce, political stability, and a global knowledge base. D. the rise of a global workforce, global economies of scale, and global production and operations. General Feedback: Score:
9.

Correct Answer

Feedback

10th: p. 598 11th: p. 557 1/1

Making judgments and taking action on the basis of narrow or personal characteristics is referred to as:

Student Response Value A. micromarketing. B. macromarketing. C. particularism. D. prejudicial. General Feedback: Score:
10.

Correct Answer

Feedback

100%

10th: p. 600 11th: p. 558 1/1

General challenges and obstacles to global business systems are typified by: Student Response Value A. different technology standards, shortages of skilled consultants, and social expectations. B. brand-name expectations, language differences, and commercial regulations. C. different work hours, transborder data and privacy laws, and different technology standards. D. different communications 100% Correct Answer Feedback

Student Response Value standards, language differences, and network reliability. General Feedback: Score:
11.

Correct Answer

Feedback

10th: P. 600 11th: p. 559; Also see slide 8. 1/1

To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms: Student Response Value A. maintain a master database at their head offices. B. develop a master system that meets the standards of all the countries concerned. C. use microwave satellite transmission to move data. 100% D. develop separate systems within each country. General Feedback: Score:
12.

Correct Answer

Feedback

10th: p. 600 11th: p. 559 1/1

In terms of global business strategy and structure, a domestic exporter is most likely to use a policy of: Student Response Value 100% A. some dispersed sales, with centralized production, accounting, human resources, and strategic management. B. centralized production and accounting with decentralized marketing and human resources. C. centralized production, accounting, marketing, and human resources. D. dispersed production and marketing, with centralized accounting, human resources and strategic management. Score:
13.

Correct Answer

Feedback

1/1

In terms of global business strategy and structure, a multinational company is most likely to use a policy of:

Student Response Value A. mixed sales and marketing, with centralized production, accounting, human resources, and strategic management. B. centralized production, accounting, marketing, human resources, with strategic management. C. dispersed production, accounting, human resources, with centralized strategic management, and marketing. D. dispersed production and marketing, with centralized accounting and strategic management. General Feedback: Score:
14.

Correct Answer

Feedback

100%

10th: p. 602 11th: p. 561 1/1

In duplicated systems Student Response Value A. development occurs 100% at the home base and operations are handed over to autonomous units in foreign locations. B. each foreign unit designs its own unique solutions and systems. C. systems development and operations occur in an integrated and coordinated fashion across all units. D. foreign units design the solutions and systems used at the domestic home base. General Feedback: Score:
15.

Correct Answer

Feedback

10th: p. 604 11th: p. 562 1/1

Franchise companies (e.g., KFC) have typically had ________ systems. Student Response Value A. duplicated 100% Correct Answer Feedback

Student Response Value B. centralized C. decentralized D. networked Score:


16.

Correct Answer

Feedback

1/1

Which systems are worth sharing on a transnational basis, from a cost and feasibility point of view? Student Response Value A. Only systems that support functions that are absolutely critical to the organization B. Core systems and worthwhile provincial systems C. Core systems and any financial systems that can be easily integrated with each other D. Financial and accounting systems General Feedback: Score:
17.

Correct Answer

Feedback

100%

10th: p. 608 11th: p. 566 1/1

Based on your reading of Chapter 15, why should companies avoid implanting an all-encompassing, new global system when moving towards global operatio Student Response Value A. These may fail due to lack of visibility B. Lack of power to convince senior management that transnational systems are worthwhile 0% C. Grand design approaches typically fail to identify centers of excellence D. Opposition is strengthened because of requirements for huge resources General Feedback: Score:
18.

Correct Answer

Feedback

10th: p. 609 11th: p. 566 0/1

A critical necessity for ensuring the integration of local systems into a global system is: Student Response Value A. adherence to data and technical standards. B. use of standard Correct Answer Feedback

Student Response Value hardware at the local level. C. use of standard user 0% software at the local level. D. All of the above. Score:
19.

Correct Answer

Feedback

0/1

The four key technical trends responsible for current ethical stresses related to information technology are: Student Response Value A. doubling of computer power every 18 months, data analysis advances, networking advances, the Internet. B. doubling of computer power every 18 months, declining data storage costs, data analysis advances, lack of international standards for data protection. C. doubling of computer power every 18 months, 100% Correct Answer Feedback

Student Response Value declining data storage costs, data analysis advances, networking advances and the Internet. D. doubling of computer power every 18 months, declining data storage costs, data analysis advances, ease in file sharing and copying. General Feedback: Score:
20.

Correct Answer

Feedback

10th: p. 130 11th: p. 126 1/1

The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: Student Response Value A. profiling. B. spyware. C. spamming. D. targeting. General Feedback: Score:
21.

Correct Answer

Feedback

100%

10th: p. 131 11th: p. 126 1/1

The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: Student Response Value A. due process. B. accountability. C. courts of appeal. D. judicial system. General Feedback: Score:
22.

Correct Answer

Feedback

100%

10th: p. 135 11th: p. 129 1/1

Which of the following is not one of the five steps discussed in the chapter as a process for analyzing an ethical issue? Student Response Value A. Assign responsibility. B. Identify the stakeholders. C. Identify the options you can reasonably take. D. Identify and clearly describe the facts. General Feedback: Score:
23.

Correct Answer

Feedback

100%

10th: p. 136 11th: p. 129-130 1/1

The ethical "no free lunch" rule states that: Student Response Value A. if an action cannot be taken repeatedly, then it is not right to be taken at any time. B. one should take the action that produces the least harm or incurs the least cost. C. everything is owned 100% by someone else, and that the creator wants compensation for this work. D. one can put values in rank order and understand the consequences of various courses of action. General Feedback: Score:
24.

Correct Answer

Feedback

10th: p. 137 11th: p. 130 1/1

When a cookie is created during a Web site visit, it is stored: Student Response Value A. on the Web site computer. Correct Answer Feedback

Student Response Value B. on the visitors computer. C. on the ISPs computer. D. in a Web directory. Score: 1/1 100%

Correct Answer

Feedback

Вам также может понравиться