0% found this document useful (0 votes)
36 views

Principles of MIS Testbank

This document contains a key for true/false and multiple choice questions from Chapter 1 of a textbook on foundations of information systems in business. It provides the answers to 38 true/false questions about topics like the importance of information systems, types of information systems, and components of information systems. It also provides the answers to 8 multiple choice questions testing understanding of how information technology can be used to support business functions.

Uploaded by

Yousra Th
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Principles of MIS Testbank

This document contains a key for true/false and multiple choice questions from Chapter 1 of a textbook on foundations of information systems in business. It provides the answers to 38 true/false questions about topics like the importance of information systems, types of information systems, and components of information systems. It also provides the answers to 8 multiple choice questions testing understanding of how information technology can be used to support business functions.

Uploaded by

Yousra Th
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Chapter 01 Foundations of Information Systems in Business Answer Key

True / False Questions


1. Having a basic understanding of information systems is good, but not nearly as important as understanding other functional
business areas.
FALSE
Having a basic understanding of information systems is just as important as understanding other functional business areas.

2. Information technology can help all kinds of businesses improve the efficiency and effectiveness of their business processes
and managerial decision making.
TRUE

3. Maintenance is one of the key activities in the development and management of a business information system.
TRUE

4. One system can be made up of other systems or can be a part of a bigger system.
TRUE

5. Smoke signals and library card catalogs are examples of an information system.
TRUE

6. The term "information technology" refers to all of the components and resources necessary to deliver the information and
functions of a system to an organization.
FALSE
The term "information technology" refers to the various hardware, software, networking, and data management components
necessary for the system to operate. "Information system" describes all of the components and resources necessary to deliver
its information and functions to the organization.

7. An information system can use hardware as simple as a pencil and paper to capture and store its data.
TRUE

8. Gaining a strategic advantage over competition requires the innovative application of information technologies.
TRUE

9. Integration of business systems allows greater flexibility and provides greater business support than any of the individual
systems could provide alone.
TRUE

10. Most retail stores now use computer-based information systems to keep track of inventory, but few use them to evaluate
sales trends.
FALSE
Most retail store now use computer-based information systems to both keep track of inventory and to evaluate sales trends.

11. Decision support systems (DSS) provide managerial end users with ad hoc and interactive support of their decision-making
processes.
TRUE

12. Expert systems can serve as consultants to users by providing expert advice in limited subject areas.
TRUE

13. An extranet is an Internet-like network inside the enterprise; an intranet is between the enterprise and its trading partners.
FALSE
An intranet is an Internet-like network inside the enterprise; an extranet is between the enterprise and its trading partners.

14. Enterprise collaboration systems involve the use of software tools to support e-commerce functions with customers and
suppliers.
FALSE
Enterprise collaboration systems involve the use of software tools to support communication, coordination, and collaboration
among the members of networked teams and workgroups.
1
15. A process control system is an example of an operation support system that records and processes data resulting from
business transactions.
FALSE
A transaction processing system is an example of an operation support system that records and processes data resulting from
business transactions.

16. In real-time processing, data are processed immediately after a transaction occurs.
TRUE

17. Management information systems (MIS) provide information in the form of reports and displays.
TRUE

18. An information system that supports accounting is an example of a functional business system.
TRUE

19. Information systems that focus on operational and managerial applications in support of basic business functions, such as
accounting, are known as strategic information systems.
FALSE
Information systems that focus on operational and managerial applications in support of basic business functions are known
as functional business systems.

20. An expert system can provide advice for operational chores, such as equipment diagnostics or loan portfolio management.
TRUE

21. Mismanagement or misapplication of information systems can ultimately result in business failure.
TRUE

22. A large-scale movement to outsource basic software programming functions to India, the Middle East, and Asia-Pacific
countries has resulted because U.S. programmers have been inadequately trained.
FALSE
Outsourcing software programming functions has resulted because of rising labor costs in North America, Canada, and
Europe.

23. Falling prices of computer hardware and software should continue to induce more businesses to expand their computerized
operations.
TRUE

24. Increased importance placed on cyber-security will reduce the need for workers skilled in information security.
FALSE
Increased importance placed on cyber-security will result in an increased need for workers skilled in information security.

25. The human body and an oil refinery can both be classified as systems.
TRUE

26. In order for something to be classified as a "system", a computerized environment must be involved.
FALSE
Many examples of systems can be found in the physical and biological sciences, technology, and human society.

27. A home temperature control system is an example of a cybernetic system.


TRUE

28. A sales manager exercises control when reassigning salespersons to new territories after evaluating feedback about their sales
performance.
TRUE

29. An organization is considered an open system when it interfaces and interacts with other systems in its environment.
TRUE
2
30. Multiple systems never share an environment; each has its own.
FALSE
Several systems may share the same environment.

31. Information systems are just like any other system, but their value to the modern organization is unlike any other system ever
created.
TRUE

32. Anyone who uses an information system or the information it produces can be referred to as an end user.
TRUE

34. Optical disks and plastic cards are examples of hardware resources, but paper forms are not.
FALSE
Optical disks, plastic cards, and paper forms are all examples of hardware resources.

35. In the context of the information systems model, computer peripherals typically consist of hardware devices, such as
keyboards, and productivity tools, such as word processing software.
FALSE
Computer peripherals typically consist of hardware devices that allow the input, output, or storage of data; word processing
software is not a hardware resource.

36. In the context of the information systems model, data resources are typically organized as databases and expert systems.
FALSE
Data resources are typically organized as databases and knowledgebases.

37. In the context of the information systems model, information is subjected to a "value-added" process that converts it to data
that meet the needs of end users.
FALSE
In the context of the information systems model, data is subjected to a value-added process that converts it to information
that meets the needs of end users.

38. Data can be thought of as context independent. This means that a list of numbers or name by themselves do not provide an
understanding of the context in which they were recorded.
TRUE

39. Data are raw facts or observations, typically about physical phenomena or business transactions.
TRUE

40. In information systems activities, the processing of data resources typically takes the form of data entry activities.
FALSE
The input of data resources typically takes the form of data entry activities.

41. In information systems activities, a user interface commonly refers to a more convenient and efficient method of end-user
input and output with a computer system.
TRUE

42. Calculating employees' pay, federal taxes, and other payroll deductions is a business example of a computerized processing
activity.
TRUE

43. After data has been entered into a computerized information system, it is usually not necessary to correct or update it. That is
the benefit of a computerized system—once entered, always correct.
FALSE
The quality of any data stored in an information system must be maintained by a continual process of correcting and updating
activities.

3
Multiple Choice Questions

44. Information technology can be used to support _______________.

D. All the choices are correct.

45. In its simplest form, a system consists of all the following except:
A. A group of cooperative users

46. According to the Real World case, eCourier embraced technology by:

D. Giving all their couriers handheld GPS units for tracking and communication.
Lufthansa plans to phase out the desktop computers that it had previously deployed in airports, thereby streamlining its
infrastructure and cutting costs.

47. According to the Real World case, eCourier uses SeeWhy software to:

B. Provide business intelligence in terms of customer satisfaction.

48. According to the Real World Case, the goal of Bryan Cave is:

C. To build the best long-term relationships in the world.

49. According to the Real World Case, the Bryan Cave law firm had difficulty billing its real estate customers because:

B. Developers think in terms of square feet, not hours worked.

50. According to the Real World Case, the big problem facing the Bryan Cave law firm in 2002 was:

D. Making the highest profits from their resources while delivering the highest customer value.

51. All the following are examples of an information system, except:

C. A group of marbles in a box

52. According to the text, most retail stores today use computer-based information systems to support business processes and
operations. This support falls broadly into the categories of:
A. Business decisions and strategies for competitive advantage.

53. How do information systems aid in decision making?

D. All of the choices are correct.

54. All of the following are fundamental reasons for business applications of information technology except:

C. Compliance with environmental regulations

4
55. According to the textbook case, Welch's uses BI software from Oco to:

C. ensure that its carriers are shipping full truckloads to customers.

56. According to the textbook case, the Oco BI software used by Welch's:

D. helps them even out the number of delivery trucks used each day of the week.

57. The expanding role of information systems from the 1950s to the present, in sequential order, are:

C. Data processing, management reporting, decision support, strategic and end user support, electronic business and
commerce

58. The rapid development of microcomputer processing power, application software packages, and telecommunications
networks gave birth to the phenomenon of _______________.

C. end user computing

59. Which of the following is a false statement?

D. None of the statements is false.

60. Companies generally rely on e-business applications to do all of the following except:

C. Monitor employee productivity

61. In an e-business enterprise, an intranet refers to:

A. An Internet-like network inside the enterprise

62. E-business uses Internet technologies to work and empower _______________.

D. All of the choices are correct.

63. E-commerce ____________________.

D. All of the choices are correct.

64. The text classifies information systems as either operations or management support information systems. Which one of the
following would not be classified as an operations support system?

D. Decision support systems

65. Electronic commerce systems generally include all of the following except:

B. Direct links to credit reporting services


5
66. Process control systems monitor and control _______________ processes.
A. physical

67. A nuclear power plant uses electronic sensors linked to computers to continually monitor processes and make instant (real-
time) adjustments that control the power generation process. This is an example of a(n) _______________.

D. process control system

68. When employees in a project team use email to send and receive messages and use video conferences to hold electronic
meetings and coordinate their activities, they are using _______________.

C. enterprise collaboration systems

69. A database of customer purchases that provides end-user managers with interactive and ad hoc decision-making support is
referred to as _______________.

B. a decision support system

70. A production manager needs a system to help determine how much product to manufacture based on the expected sales
associated with a future promotion, plus the location and availability of the raw materials necessary to manufacture the
product. What type of system would meet this manager's needs?

D. Decision support system

71. When information system applications focus on providing information and support for effective decision making by managers,
they are called _______________ support systems.

B. management

72. An information system that supports the business functions of accounting, finance, human resource management, marketing,
or operations would be classified as a(n) _______________ system.
A. functional business

73. Information systems that focus on operational and managerial applications in support of basic business functions, such as
accounting or marketing, are known as _______________.
A. functional business systems

74. Most information systems are designed to _______________.

D. All the choices are correct.

75. Executive information systems (EIS) are tailored to meet the strategic information needs of which of the following
management levels?
A. Top management (strategic)

6
76. Business applications of information systems are typically combinations of several types of information systems. This
integration is referred to as _______________ systems.

C. cross-functional informational

77. Success in today's dynamic business environment depends heavily on maximizing the use of Internet-based technologies and
Web-enabled information systems to meet the competitive requirements of _______________.

D. All of the choices are correct.

78. A functional business system supports all of the following types of applications except:

B. Customer problem resolution

79. Which of the following systems acts as a consultant to users?

D. Expert

80. According to the textbook case on responsibility and accountability, even if a project is not an IT project, who is held
responsible for optimizing returns on IT-related investments?

D. CIO

81. According to the textbook case on responsibility and accountability:

B. IT is never 100% responsible for any large project involving information technology.

82. Developing an information system solution involves all of the following steps except:

C. Redesign

83. Computer-based information systems are usually conceived, designed, and implemented using some form of systematic
development process. The investigation stage includes _______________.
A. determining the economic or technical feasibility of a proposed application

84. Developing information system solutions to business problems in an organization is the responsibility of _______________.

D. all information system users within the organization

85. When applying a systematic development process for computer-based information systems, _______________ would be part
of the analysis phase.
A. determining the business requirements of the system

86. According to the text, the steps of developing an information system, in their proper order, are:

D. Investigate, analyze, design, implement, maintain


7
87. In the lawsuit filed against Hannaford Brothers, which of the following was not alleged as a reason for filing the suit?

C. Hannaford sold the data to spammers.

88. The information systems function is equally as important to business success as the function of _______________.

D. All the choices are correct.

89. In the information systems concept, the processing function involves:

B. Transformation processes that convert input into output

90. According to the Real World case about the New York Times, the newspaper industry is in very deep trouble. What has
become most important to them?
A. Business model innovation

91. If a system is one of the components of a larger system, it is considered a(n) _______________.

C. subsystem

92. A system that can change itself or its environment in order to survive is _______________ system.

D. an adaptive

93. Organizations are examples of _______________ systems because they interface and interact with other systems in their
environment.

B. open

94. The majority of organizations today would be classified as _______________ systems.

C. open adaptive

95. An information system depends on all of the following resources except:

D. Time

96. All of the following would be considered a hardware resource except:

D. Programs and procedures

97. All of the following would be considered a software resource in an information system except:

C. A telecommunication network

8
98. In an information system context, which one of the following would be the most applicable description of application
software?

B. It consists of programs that direct particular processing activities

99. In an information system, alphanumeric data normally takes the form of _______________.
A. numbers and alphabetical characters

100. In an information system, image data normally takes the form of _______________.

C. graphic shapes and figures

101. All of the following are good examples of information except:

D. The numbers 1236789, 349875, and 340977

102. Telecommunications networks consist of _______________.

D. All of the choices are correct.

103. All of the following normally happens to data during a value-added process except:

A. Their useful life is determined

104. All of the following are considered computer hardware technology except:

A. Operating system software

105. Which of the following is an example of control of an information system's performance?

C. Subtotals do not add up to total sales; IT staff investigates whether data entry or processing is the problem

106. The original, formal record of a transaction is called the:

D. Source document

107. The source document is:

C. The original, formal record of a transaction

9
Fill in the Blank Questions
108. An _______________ system is an organized combination of people, hardware, software, telecommunications networks, and
data resources that collects, transforms, and disseminates information in an organization.
information

109. With a strategic information system (SIS), information technology becomes an integral part of business processes, products,
and _______________.
services

110. _______________ is defined as the use of Internet technologies to work and empower business processes, electronic
commerce, and enterprise collaboration within a company and with its customers, suppliers, and other business stakeholders.
E-business

111. Enterprise collaboration systems use software tools to support _______________ among the members of networked teams
and workgroups.
communication, coordination, or collaboration

112. During the 1980s and 1990s, information technology helped companies gain a competitive advantage in the global
marketplace. This is referred to as the _______________ information systems concept.
strategic

113. A _______________ team uses a corporate intranet and the Internet for electronic mail, videoconferencing, electronic
discussion groups, and Web pages of work-in-progress information to collaborate on business projects.
virtual

114. Electronic _______________ is the buying, selling, marketing, and servicing of products, services, and information over a
variety of computer networks.
commerce

115. Types of information systems are generally classified as either operations information systems or _______________
information systems.
management

116. Marketing and selling books to consumers over the Internet is an example of _______________ commerce.
electronic or Internet or "E-"

117. A system that controls the industrial processes of an organization would be classified as a(n) _______________ support
system.
operations

118. Transaction processing systems process transactions in two basic ways, _______________ processing or real-time.
batch

119. When a manager uses an interactive, computer-based information system to assist in his/her decision making, the manager is
using a _______________ support system.
decision

120. A system that provides pre-specified reports for the managers of an organization would be classified as a _______________
system.
management

121. Enterprise collaboration systems enhance team and workgroup communication and productivity, and include applications that
are sometimes called office _______________ systems.
automation

10
122. The goal of knowledge management systems (KMS) is to help knowledge workers create, organize, and _______________
important business knowledge wherever and whenever it is needed.
share

123. The success of an information system should be measured by both its efficiency and its _______________.
effectiveness

124. The design of an information system application is based on an _______________ of the business requirements of an
organization.
analysis

125. As a manager, you must be aware of what uses of information technology might be considered improper, irresponsible, or
harmful to individuals or to society. This dimension of the use of information technology is referred to in the text as an
_______________ responsibility.
ethical

126. A manufacturing system accepts raw materials as input and produces finished goods as output. An information system accepts
data as input and processes them into _______________ as output.
information

127. A system with feedback and _______________ functions is sometimes called a cybernetic system.
control

128. The _______________ component in a cybernetic system refers to the data about the performance of the system.
feedback

129. _______________ is data about the performance of a system.


Feedback

130. _______________ involves monitoring and evaluating feedback to determine whether a system is moving toward the
achievement of its goal.
Control

131. People, hardware, software, __________, and networks are the five basic resources of information systems.
data

132. Information processing consists of the system activities of input, processing, output, _______________, and control.
storage

133. In the context of the information system model, software resources include the sets of operating instructions called
_______________, which direct and control computer hardware.
programs

134. In the context of the information systems model, _______________ are the operating instructions for the people who will use
an information system. Examples are instructions for filling out a paper form or using a software package.
procedures

135. Information in various forms is transmitted to end users and made available to them in the _______________ activity.
output

136. A _______________ document is the original, formal record of a transaction.


source

137. _______________ is the information systems activity in which data and information are retained in an organized manner for
later use.
Storage

11
138. In an information system, the _______________ activity would be considered the component that evaluates feedback in order
to determine whether the system is moving toward the achievement of its goal.
control

True / False Questions (Chapter 5)

1. Variable-length records contain a variable number of fields with fixed field lengths.
FALSE
Variable-length records contain both a variable number of fields and variable field lengths.

2. When independent of any other files related to it, a single table is referred to as a compressed file.
FALSE
When independent of any other files related to it, a single table is referred to as a flatfile.

3. Files are frequently classified by the application for which they are primarily used, such as a payroll file or an inventory file.
TRUE

4. A master file is an integrated collection of logically related data elements.


FALSE
A database is an integrated collection of logically related data elements.

5. Databases contain data elements that describe both entities and the relationships among entities.
TRUE

6 Database management packages based on the relational model can link data elements from various tables to provide
information to users.
TRUE

7. The project operation is used to create a subset of the columns contained in the temporary tables created by the select and
join operations.
TRUE

8. A major benefit of multidimensional databases is that they are a compact and easy-to-understand way to visualize and
manipulate data elements that have many interrelationships.
TRUE

9. Multidimensional databases have become the least popular structure for analytical databases that support online analytical
process (OLAP) applications, in which fast answers to complex queries are expected.
FALSE
Multidimensional databases are the most popular database structure for OLAP applications.

10. The multidimensional database structure is considered one of the key technologies of a new generation of Web-based
applications.
FALSE
The object-oriented model is one of the key technologies of a new generation of Web-based applications.

11. A database with a network data structure can easily handle a many-to-many data relationship, whereas a hierarchical model
cannot.
TRUE

12. The network model can easily handle ad hoc requests for information, whereas the hierarchical model cannot.
FALSE
Because its relationships must be specified in advance, the network model is unable to handle ad hoc requests for
information.

12
13. All of the relationships between the data elements in a relationally organized database need to be specified when the
database is created.
FALSE
Not all of the relationships between data elements need to be specified when the database is created. Database management
software can create new tables of data relationships by using parts of the data from existing tables.

14. Relational databases are more difficult for programmers to work with and more difficult to maintain than the hierarchical and
network models.
FALSE
Because database management software can create new tables of data relationships from existing tables, relational databases
are easier for programmers to work with and maintain than the hierarchical and network models.

15. Large organizations usually place control of enterprise-wide database development in the hands of database administrators
(DBAs) and other database specialists.
TRUE

16. An active data dictionary will prevent a data entry program from using a nonstandard definition of a customer record.

TRUE

17. A data model serves as a logical framework on which to base the physical design of a database.
TRUE

18. Distributed databases can reside on network servers on the World Wide Web, on corporate intranets, or on corporate
extranets.
TRUE

19. A large database system is often distributed into smaller databases based on some logical relationship between the data and
the location of the databases.
TRUE

20. In a distributed database system, each location gains control of its local data, but loses access to data in other locations.
FALSE
Each location has control of its local data, but all locations can access any other database in the company.

21. One drawback to the database duplication process is that no changes can ever be made to any database other than the
master. Otherwise, local changes will be overwritten during the duplication process.
TRUE

22. Distributed databases require fewer resources when it comes to computing power and bandwidth.
FALSE
Distributed databases require extra computing power and bandwidth to access multiple databases in multiple locations.

23. In a traditional file processing approach, each business application is designed to use one or more specialized data files
containing only specific types of data records.
TRUE

24. Having data in independent files makes it easier to provide end users with information for ad hoc requests.
FALSE
Having data in independent files makes it difficult to provide end users with information for ad hoc requests.

25. In file processing systems, application programs typically contain references to the specific format of the stored data.
TRUE

26. In file processing systems, it was easy for data elements, such as stock numbers and customer addresses, to be defined
differently by different end users and applications.
TRUE

13
27. Boolean logic was developed during the latter part of the 1900s.
FALSE
Boolean logic was developed by George Boole in the mid-1800s.

28. The Internet is nothing more than the world's largest database.
TRUE

29. DBMS packages play a major role in application development.


TRUE

Multiple Choice Questions

30. In all information systems, data resources must be organized and structured in some logical manner, so that they can be:

D. All of the choices are correct.

31. From a logical point of view, a(n) _______________ is the smallest data element that can be observed and manipulated.
A. character

32. A record represents a collection of _______________ that describe an entity.

D. attributes

33. All the fields used to describe the attributes of an entity are grouped to form a(n) _______________.

B. record

34. A group of related records is a data file, or a _______________

C. table

35. Variable-length records contain:


A. both a variable number of fields and variable field lengths.

36. Fixed-length records contain:

D. both a fixed number of fields and fixed field lengths.

37. When independent of any other files related to it, a single table is referred to as a(n):

B. Flat file

38. A(n) _______________ is an integrated collection of logically related data elements.

C. database
14
39. Databases contain data elements that describe both entities and the _______________ among entities.
A. relationships

40. Database management packages based on the _______________ model can link data elements from various tables to provide
information to users.

B. relational

41. Early mainframe DBMS packages used the _______________ structure, in which all records are dependent and arranged in
multilevel structures, consisting of one root record and any number of subordinate levels.

C. hierarchical

42. In a(n) _______________ database structure, all of the relationships among records are one-to-many, because each data
element is related to only one element above it.
A. hierarchical

43. Which database model allows many-to-many relationships among records so that a data element can be accessed by following
one of several paths?

B. Network

44. The _______________ model is the most widely used database structure today.

C. relational

45. In the relational database model, all data elements within the database are viewed as being stored in the form of simple two-
dimensional tables, sometimes referred to as _______________.

D. relations

46. The tables in a relational database are flat files which have rows and columns. Each row represents a _______________ in the
file.

B. record

47. The tables in a relational database are flat files which have rows and columns. Each column represents a _______________ in
the file.
A. field

15
48. The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the
select and join operations.

C. project

49. Using a relational database, a user can temporarily combine two or more tables so that he/she can see relevant data in a form
that looks like it is in one big table. This is the _______________ operation.
A. join

50. _______________ is the most commonly used database application for the PC.

B. Microsoft Access

51. _______________ databases have become the most popular structure for analytical databases that support online analytical
process (OLAP) applications, in which fast answers to complex queries are expected.

D. Multidimensional

52. The _______________ database structure is considered one of the key technologies of a new generation of Web-based
applications.

C. object-oriented

53. The object-oriented database model supports _______________. That is, new objects can be automatically created by
replicating some or all of the characteristics of one or more parent objects.
A. inheritance

54. Object technology allows designers to do all of the following except:

D. Substantially reduce the file size of designs

55. Which database structure works effectively with complex data types, such as video clips, audio segments, and other subsets of
Web pages, and is considered one of the key technologies of Web-based applications?

C. Object-oriented

56. A database with a(n) _______________ data structure can easily handle a many-to-many data relationship.

B. network

57. A database with a(n) _______________ data structure can easily handle ad hoc requests for information.

C. relational

16
58. According to one database pioneer, the future development of databases and data warehouses will depend on
_______________.

B. columns

59. Large organizations usually place control of enterprise-wide database development in the hands of _______________.
A. Database administrators (DBAs)

60. According to the text, most data warehouses will run _______________ in a column format.

B. 50 times faster

61. Database administrators and database design analysts work with end users and systems analysts to do all of the following
except:

D. Enter live data into the system until it has proven to be reliable

62. _______________ are used to model the relationships among the many entities involved in business processes.
A. Entity-relationship diagrams

63. The physical design stage of database development:

C. Determines the data storage structures and access methods

64. The _______________ stage of database development translates the conceptual models into the data model of a DBMS.

D. logical design

65. A _______________ is an overall logical view of the relationships among the data elements in a database.
A. schema

66. A _______________ is an overall logical view of the relationships needed to support specific end-user application programs
that will access the database.

B. subschema

67. According to the textbook case, the innovation of the open-source product Hadoop is _______________.

C. that it has no proprietary predecessor

17
68. According to the textbook case, file processing in Hadoop is not halted by hardware failures because _______________.

D. Hadoop keeps three (3) copies of all data

69. Operational databases store the detailed data needed to support the business processes and operations of a company. They
are also called _______________.

D. All of the choices are correct.

70. The primary challenge of a distributed database is:


A. Data accuracy

71. Which of the following statements concerning the replication and duplication process for updating distributed databases is
correct?

C. Replication is the more complicated process because it must find changes in each distributed database and make
appropriate changes to make each database identical

72. What type of databases are employees using when they access online data banks, whether those data banks are free or paid
for through subscriptions?

C. External databases

73. A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis,
market research, and decision support is called a _______________.

B. data warehouse

74. A data warehouse contains data that have been processed in all the following ways except:
A. Separated

75. Which of the following is true of data marts?

B. They are a subset of a data warehouse.

76. Which of the following is true of data in a data warehouse?


A. Data in operational databases is ever changing; data in data warehouses is static

18
77. Which of the following is a legitimate use for data mining?

D. All of the choices are correct.

78. All of the following contribute to problems when using a file management approach except:

C. Data independence

79. Database management involves the use of database management software to control how databases are _______________.

D. All of the choices are correct.

80. In mainframe and server computer systems, the database management system controls the _______________ of the
databases of computer-using organizations.

D. All of the choices are correct.

81. All of the following are major functions of a database management system except:

B. Identifying insufficient data processing or storage needs

82. Database development involves defining and organizing the _______________ of the data needed to build a database.
A. structure

83. A DBMS query language is designed to:

B. Support end users who wish to obtain ad hoc reports

84. The database maintenance process is accomplished via:

B. Transaction processing systems and other end user applications, with the support of the DBMS

85. The basic form of a SQL query is:

C. SELECT … FROM … WHERE …

86. Boolean logic deals with three logical operators:

D. AND, OR, and NOT

87. Many end users have trouble correctly phrasing database language search queries, so most end-user DBMS packages now
offer _______________ methods.

C. GUI

19
Fill in the Blank Questions
88. All of the fields used to describe the attributes of an entity are grouped to form a _______________.
record

89. _______________ contain both a variable number of fields and variable field lengths.
Variable-length records

90. _______________ contain both a fixed number of fields and fixed field lengths.
Fixed-length records

91. A group of related records is a data file, or a _______________.


table

92. A _______________ is an integrated collection of logically related data elements.


database

93. Databases contain data elements that describe both entities and the _______________ among entities.
relationships

94. In the relational database model, all data elements within the database are viewed as being stored in the form of simple, two-
dimensional tables, sometimes referred to as _______________.
relations

95. The tables in a relational database are flat files, which have rows and columns. Each row presents a single _______________
in the file.
record

96. The tables in a relational database are flat files, which have rows and columns. Each column represents a _______________.
field

97. The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the
select and join operations.
project

98. An _______________ consists of data values describing the attributes of an entity, plus the operations that can be performed
upon the data.
object

99. A weakness in the hierarchical model is that it cannot handle _______________ data relationships.
many-to-many

100. A weakness in the network model is that it cannot handle _______________ for information.
ad hoc requests

101. A database of data definitions and specifications is called a metadata repository, or a _______________.
data dictionary

102. Database administrators and designers work with corporate and end user management to develop an _______________
model that defines the basic business process of the enterprise.
enterprise

103. _______________ relationship diagrams are used to model the relationships among the many entities involved in business
processes.
Entity

20
104. A _______________ is an overall logical view of the relationships among the data elements in a database.
schema

105. _______________ database design takes a physical view of the data that describes how data are to be physically stored and
accessed on the storage devices of a computer system.
Physical

106. Data models represent _______________ views of the data and relationships of the database.
logical

107. Entity Relationship Diagrams are _______________ of the various files and their relationships within a database system.
graphical models

108. A website stores hyperlinked pages of multimedia (text, graphics, photographs, video, and audio) in a _______________
database.
hypermedia

109. The duplication process basically identifies one database as a _______________ and then duplicates that database at a
prescribed time so that each distributed location has the same data.
master

110. Data warehouses may be subdivided into _______________, which hold subsets of data from the warehouse that focus on
specific aspects of a company, such as a department or a business process.
data marts

111. _______________, data that define the data in the data warehouse, are stored in a metadata repository and cataloged by a
metadata directory.
Metadata

112. In _______________, the data in a data warehouse are analyzed to reveal hidden patterns and trends in historical business
activity.
data mining

113. To solve the problems encountered with the file processing approach, the _______________ management approach was
conceived. It is the foundation of modern methods of managing organizational data.
database

114.) Database _______________ involves using transaction processing systems and other tools to add, delete, update, and correct
the data in a database.
maintenance

115. SQL is an acronym for _______________. It is an international standard query language found in many DBMS packages.
Structured Query Language

116. The basic form of a SQL query is SELECT…FROM… _______________.


WHERE

117. Boolean logic consists of three logical operators: AND, OR, and _______________.
NOT

21
(Chapter 6)

1. A change in technology often induces social, political, and economic system changes long

before a critical mass of users is reached.

FALSE

Until a critical mass of users is reached, a change in technology only affects the technology.

2. The telecommunications industry has changed from a deregulated market to government-

regulated monopolies.

FALSE

The opposite is true; the telecommunications industry has gone from government-regulated

monopolies to a deregulated market.

3. Middleware is an essential component of any IT infrastructure because it allows disparate

systems to be isolated.

FALSE

Middleware is an essential component of any IT infrastructure because it allows disparate

systems to be joined together in a common framework.

22
4. Business-to-business electronic commerce websites can be used by businesses to establish

strategic relationships with their customers and suppliers.

TRUE

5. The Internet has a central computer system that is the most powerful in the world.

FALSE

The Internet has no central computer system or telecommunications center.

6. The Internet provides electronic discussion forums and bulletin board systems that are formed

and managed by special-interest newsgroups.

TRUE

7. Booking a reservation over the Internet costs an airline about 50 percent less than booking the

same reservation over the telephone.

FALSE

Booking a reservation over the Internet costs an airline about 90 percent less than booking the

same reservation over the telephone.

8. An intranet is a network inside an organization that uses Internet technologies to provide an

Internet-like environment within the enterprise.

TRUE

23
9. Intranets seldom have much impact on communications and collaboration within an enterprise.

FALSE

Intranets can significantly improve communications and collaboration within an enterprise.

10. Software that is installed on intranet Web servers can be accessed by employees within the

company or by external business partners who are using Web browsers, if access is allowed by

the company.

TRUE

11. If access to data is not restricted with passwords and other security mechanisms, the integrity of

the data can be easily compromised.

TRUE

12. An extranet is a network inside a company that uses Internet technologies to provide a private

Internet-like network environment to the firm.

FALSE

An intranet does this.

13. Web browser technology makes customer and supplier access of intranet resources a lot easier

and faster than with previous business methods.

TRUE

14. A client/server network of several interconnected local area networks can replace a large

mainframe-based network with many end user terminals.

TRUE
24
15. The network-centric concept views the PC as the central computing resource of any computing

environment.

FALSE

The network-centric concept views networks as the central computing resource of any computing

environment.

16. In the central server architecture of P2P networking, the P2P software connects your PC to a

central server with the directory of all users of the network.

TRUE

17. In the pure peer-to-peer architecture of P2P networking, the P2P software connects your PC to a

central server with the directory of all users of the network.

FALSE

In the central server architecture of P2P networking, the P2P software connects your PC to a

central server with the directory of all users of the network.

18. The Internet, as originally conceived in the late 1960s, was a pure peer-to-peer system.8

FALSE

The Internet was conceived as a peer-to-peer system.

19. The unique achievement of Napster was the empowerment of the peers, in association with a

central index, to quickly and efficiently locate available content.

TRUE

25
20. Output from analog devices must be converted into digital form in order to input it into a

computer.

TRUE

21. Today, ordinary telephone wire is the least used medium for telecommunications.

FALSE

Ordinary telephone wire is still the most widely used medium for telecommunication.

22. Newly developed optical routers will be able to send optical signals up to 2,500 miles without

regeneration.

TRUE

23. Communications satellites can use microwave radio as their telecommunications medium.

TRUE

24. PCS phone systems cost substantially more to operate and use than cellular systems, but have

lower power consumption requirements.

FALSE

PCS phone systems cost substantially less to operate and use than cellular system, and they

have lower power consumption requirements.

25. Wi-Fi is faster and less expensive than Standard Ethernet and other common wire-based LAN

technologies.

TRUE

26
26. A Bluetooth chip is designed to replace cables; it takes the information normally carried by a
(
cable and transmits it to a receiver Bluetooth chip.

TRUE

27. In frequency division multiplexing (FDM), a multiplexer effectively divides one high-speed

channel into multiple high-speed channels.

FALSE

A multplexer divides a high-speed channel into multiple slow-speed channels.

28. Multiplexers work to increase the number of transmissions possible, while also increasing the

number of physical data channels.

FALSE

Multiplexers work to increase the number of transmissions possible without increasing the

number of physical data channels.

29. Telecommunications and network management software can reside in communications

processors, such as multiplexers and routers.

TRUE

30. Mainframe-based wide area networks frequently use telecommunications monitors or

teleprocessing monitors.
TRUE

31. The Open System Interconnection (OSI) model was officially adapted as an international

standard by the International Organization of Standards (ISO).

TRUE

27
32. The Internet uses a system of telecommunications protocols that have become so widely used

that they are now accepted as a network architecture.

TRUE

33. An IP address is expressed as four decimal numbers separated by periods, such as

127.154.95.6.

TRUE

34. IP addressing can identify a particular PC connected to the Internet, but not the network to which

it is attached.

FALSE

IP addressing can identify a specific network because the IP space is divided into three address

classes, A, B, and C. The Class B portion of the address identifies networks.

35. Skype software allows telephone conversations through a PC and over the Internet instead of a

separate phone connection.

TRUE

36. Each IP address is divided into three address classes, which are A, B, and C. Class C addresses
are normally owned by large Internet service providers or major corporations.

FALSE

Class A addresses are normally owned by large Internet service providers or major corporations.

37. New technologies are extending IP addresses beyond computers to TVs, toasters, and

coffeemakers.
TRUE
28
38. Developed to work Internet2, IPv6 increases the IP address size from 32 bits to 256 bits to

support more levels of the address hierarchy.

FALSE

IPv6 increases the IP address size from 32 bits to 128 bits.

39. IPv6 supports over 300 trillion trillion trillion addresses.

TRUE

40. Voice over IP is a technology that allows a remote worker to function as if he or she were directly

connected to a regular telephone network, even while at home or in a remote office.

TRUE

41. Skype users can call to any non-computer-based landline or mobile telephone in the world for

just pennies a minute.

FALSE

Calls made to non-computer-based landlines or mobile telephones via Skype are free.

42. "Bandwidth" is typically measured in characters per second (CPS).

FALSE

"Bandwidth" is typically measured in bits per second.

43. Narrow-band channels typically use microwave, fiber optics, or satellite transmission.
FALSE

29
46. Regular telephone service relies on Packet Switching, while the Internet relies on Circuit

Switching.

FALSE

Regular telephone service relies on Circuit Switching, while the Internet relies on Packet

Narrow-band channels are usually unshielded twisted-pair lines used for telephone and modem

communications.

44. Frame relay technology is slower than X.25 and not as well suited to handle the heavy

communications traffic of interconnected local area networks.

FALSE

Frame relay is considerably faster than X.25.

45. Although we tend to think of the FCC as the oversight body for radio and television, it is equally

involved in all aspects of data and voice communications.

TRUE

30
Switching.

47. Packet Switching involves dividing a message into multiple packets which are transmitted over a

network to the receiver.

TRUE

48. The Internet is owned by the government of the United States.

FALSE

Nobody owns the Internet.

Multiple Choice

49. Telecommunications and network technologies are internetworking and revolutionizing

_______________.

A. business and society

50. Which of the following statements best defines a network?

B. An interrelated or interconnected chain, group, or system

51. A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes has

_______________ possible connections.

B. 999,000

52. Metcalfe's law states that:

A. The usefulness or utility of a network equals the square of the number of users

31
53. A change in technology induces social, political, and economic system changes

_______________.

C. only after a critical mass of users is reached.

54. The telecommunications industry has changed _______________.

C. from government-regulated monopolies to a deregulated market.

55. Open systems are a recent telecommunications trend. Open systems:

D. All of the choices are correct.

56. Programming that serves to "glue together" or mediate between two separate, and usually

already existing, programs is known as _______________.

C. middleware

57. Local and global telecommunications networks are rapidly converting to digital transmission

technologies. Digital technology provides all of the following benefits over analog technology

except:

B. Equivalent transmission speeds

32
58. Telecommunications networks now play vital and pervasive roles in Web-enabled

_______________.

D. All of the choices are correct.

59. Which of the following statements regarding Internet2 is true?

C. The purpose of Internet2 is to build a roadmap that can be followed during the next stage of

innovation for the current Internet

60. Most of the institutions and commercial partners on the Internet2 network are connected via

_______________, a network backbone that will soon support throughput of 10 Gbps.

A. Abilene

61. Traveling salespeople and those at regional sales offices can use the Internet, extranets, and

other networks to transmit customer orders from their laptop or desktop PCs, thus breaking

_______________ barriers.

D. geographic

62. Telecommunications-based business applications can help a company overcome all of the

following barriers to business success except:

C. Human resource barriers

33
63. All of the following statements about the Internet revolution are true except:

B. The central computer system of the Internet is the most powerful communications center in

the world

64. Which of the following statements regarding Internet Service Providers is correct?

A. ISPs provide individuals and organizations with access to the Internet for a fee

65. ISPs are connected to one another through network _______________.

C. access points

66. Which of the following is a key business use of the Internet?

D. All of the choices are correct.

67. Applications that use the Internet and Internet-based technologies are typically less expensive to

_______________ than traditional systems.

D. All of the choices are correct.

68. Most companies are building e-business and e-commerce websites to achieve all of the following

goals except:

B. Increase foot traffic at brick and mortar locations

34
69. An _______________ is a network inside an organization that uses Internet technologies to

provide an Internet-like environment within the enterprise.

C. intranet

70. An _______________ is a network link that uses Internet technologies to interconnect the intranet

of a business with the intranets of its customers, suppliers, or other business partners.

A. extranet

71. The use of an intranet in an organization _______________.

A. can significantly improve communications and collaboration within an enterprise.

72. All of the following would typically be supported by an organization's intranet information portal

except:

D. Recruitment

73. The comparative _______________ of publishing and accessing multimedia business information

internally via intranet websites has been one of the primary reasons for the explosive growth in

the use of intranets in business.

D. All of the choices are correct.

35
74. Based on the information presented in the text, telecommunications terminals are best described

as:

A. Any input/output device that uses telecommunications networks to transmit or receive data,

including telephones

75. The text lists five basic categories of components in a telecommunications network. One of these

categories includes telecommunications processors, which:

A. Support data transmission and reception between terminals and computers

76. The five basic categories of components in a telecommunications network include:

B. Terminals, telecommunications processors, telecommunications channels, computers, and

telecommunications control software

77. A network that covers a large geographic distance, such as a state or a country, is considered a

_______________ network.

D. wide area

36
78. Which of the following best describes a local area network?

B. A network that connects computers within a limited physical area, such as inside a single

building

79. To communicate over a network, each PC usually has a circuit board called a _______________.

D. network interface card

80. All of the following statements about a virtual private network are correct except:

C. Relies on modem, twisted-pair wire, and router technology

81. All the following describe a VPN except:

D. A VPN is available for use by anyone with access to the Internet.

82. Older, traditional mainframe-based business information systems are called _______________

systems.

C. legacy

83. Most Linux distributions are released via BitTorrent to help with _______________ needs.

B. bandwidth

37
84. The Internet, as originally conceived in the late 1960's was a _______________ system.

D. peer-to-peer

85. In telecommunications networks, twisted-pair wire:

C. Is used for both voice and data transmission

86. A communications medium that consists of one or more central wires surrounded by thick

insulation is called _______________ cable.

A. coaxial

87. Compared to coaxial cable, standard twisted-pair telephone lines:

A. Support lower data transmission speeds

88. Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber

wrapped in a protective jacket.

A. glass

89. Fiber optics are regarded as the communications media of the future, primarily due to its

_______________.

B. greater speed and capacity

38
90. As it relates to telecommunications media, the problem of the last mile is:

B. Tying into older technology

91. Which of the following technologies transmits data at the fastest rate?

B. Cable modem

92. An internetworking unit that connects networks based on different protocols is a

_______________.

B. router

93. In a telecommunications network, a hub is a communications processor that:

C. Facilitates port switching

94. In a telecommunications network, a gateway is a communications processor that:

B. Connects different communications architectures

39
95. In telecommunications networks, multiplexers:

B. Allow a single communications channel to carry multiple simultaneous data transmissions

96. Network management package functions include all of the following except:

D. All of the choices are functions of network management packages.

97. Security is a top concern of network management today, so telecommunications software must

provide all of the following except:

D. Central processing

98. A network configuration that consists of a central computer system with a number of smaller

computers tied directly to it, but not to each other, is a _______________ network.

D. star

99. Which of the following best describes how star, ring, and bus networks differ?

B. Performance, reliability, and cost

100. A(n) _______________ is a standard set of rules and procedures for the control of communication

in a network.

C. protocols

40
101. Which one of the following statements regarding a telecommunications network is false?

D. Protocols are not applicable to hardware, such as cables and modems

102. The _______________ layer in an OSI model provides communications services for end users.

A. application

103. In an OSI model, the _______________ layer does the routing and forwarding.

C. network

104. When IP was first standardized, the specification required that each system attached to the

Internet be assigned a unique, _______________ Internet address value.

D. 32-bit

105. All of the following statements regarding Internet telephony are correct except:

C. It incurs standard long-distance telephone call charges

106. Communications channels such as microwave, fiber optics, or satellite transmission that provide

high-speed transmission rates typically use _______________ channels.

A. broadband

41
107. ATM (asynchronous transfer mode) is an emerging high-capacity __________ switching

technology.

C. cell

108. VoIP works by digitizing a voice signal, chopping it into __________, and then sending them over

a company's computer network or the Internet, much like data or email.

B. packets

109. IPv4, the current Internet addressing protocol, can accommodate about _______________

addresses.

B. 4 billion

(Fill in the Blank)

110. _______________ systems are information systems that use common standards for hardware,

software, applications, and networking.

Open

111. Open systems provide greater _______________. That is, the ability of networked computers and

other devices to easily access and communicate with each other and share information.

connectivity

42
112. Internet2 is all about high-speed telecommunications and infinite _______________.

bandwidth

113. We can think of the _______________ as a network made up of millions of smaller, private

networks, each with the ability to operate independent of, or in harmony with, all the other

millions of connected networks.

Internet

114. Companies can create private secure Internet links between themselves, called _______________

private networks.

virtual

115. A communications network is any arrangement where a sender transmits a message to a

receiver over a _______________, consisting of some type of medium.


channel

116. Devices such as modems, switches, and routers, which support data transmission and reception

between terminals and computers, are known as telecommunications _______________.

processors

117. Thin clients provide a browser-based user interface for processing small application programs

called _______________.

applets

118. Network computing is sometimes called a _______________ client/server model, because it

consists of thin clients, application servers, and database servers.

three-tier

43
119. The terms analog and _______________ refer to the methods used to convert information into an

electrical signal so that it can be transmitted or processed.

digital

120. If the temperature being measured by an electronic analog thermometer is 83 degrees, the

analog system would put out __________ volts.

830, 83, 8.3, or .83

121. Dense wave division multiplexing (DWDM) can split a strand of glass fiber into _____ channels,

which enables each strand to carry 5 million calls.

40

122. Terrestrial microwave involves earthbound microwave systems that transmit high-speed

_______________ signals in a line-of-sight path between relay stations spaced approximately 30

miles apart.

radio

123. All cellular and PCS telephone systems divide a geographic area into small areas, or

__________, typically from one to several square miles in area.

cells

124. Smart telephones, pagers, PDAs, and other portable communications devices have become very

thin clients in _______________ networks.

wireless

125. The WAP standard specifies how Web pages in HTML and XML are translated into a wireless

markup language (WML) by __________ software.

filter

44
126. _______________ are the most common type of communications processor.

Modems

127. A modem converts digital signals into analog frequencies and then back again. This process is

known as modulation and _______________.

demodulation

128. The main idea in OSI is that the process of communication between two endpoints in a

telecommunication network can be divided into _______________.

layers

129. The first part of an Internet address identifies the network on which the host resides, while the

second part identifies the particular __________ on the given network.

host

130. Regular telephone service relies on circuit _______________, in which a switch opens a circuit to

establish a link between a sender and receiver. It remains open until the communication session

is completed.

switching

131. In the X.25 protocol, packets are _____ characters long, while in frame relay technology they are

of variable length.

128

45
Chapter 7

1. Cross-functional enterprise systems cross the boundaries of traditional business functions in

order to reengineer and improve vital business processes all across the enterprise.

TRUE

2. Networked enterprises view cross-functional enterprise systems as a strategic way to use IT to

centralize information resources.

FALSE

Networked enterprises view cross-functional enterprise systems as a strategic way to use IT to

share information resources and improve the efficiency and effectiveness of business processes.

3. Partner relationship management concentrates on the efficiency of a firm's internal production,

distribution, and financial processes.

FALSE

Enterprise resource planning concentrates on the efficiency and effectiveness of a firm's internal

production, distribution, and financial processes.

4. Knowledge management applications focus on providing a firm's employees with tools that

support group collaboration, decision making, and human resources management.

FALSE

Knowledge management applications provide a firm's employees with tools that support group

collaboration and decision making, but not human resources management.

46
5. Enterprise application integration (EAI) software enables users to model the business processes

and interactions that should occur between business applications.

TRUE

6. Enterprise application integration (EAI) software provides legacy systems that perform data

conversion and coordination, and application communication and messaging services.

FALSE

Enterprise application integration (EAI) software provides middleware that performs data

conversion and coordination, and application communication and messaging services.

7. Distribution and manufacturing are considered front office systems; customer service and sales

order entry are back office systems.

FALSE

Distribution and manufacturing are back office systems; customer service and sales order entry

are front office system.

8. The integration of enterprise application clusters has little, if any, impact on customer call center

responsiveness.

FALSE

The integration of enterprise application clusters has been shown to dramatically improve
customer call center responsiveness and effectiveness.

47
9. Transaction processing systems play a vital role in supporting the operations of an e-business

enterprise.

TRUE

10. Online transaction processing (OLTP) is generally considered a post-event system because

transactions are entered nightly.

FALSE

Online transaction processing is considered a real-time system because it captures and

processes transactions immediately.

11. Transaction processing systems update the corporate databases of an organization to reflect

changes resulting from day-to-day business transactions.

TRUE

12. Transaction reports can take the form of a transaction listing, such as a payroll register.

TRUE

13. Enterprise collaboration systems are cross-functional e-business systems that enhance

communication, coordination, and collaboration among the members of business teams and

workgroups.

TRUE

14. Training in a virtual world is effective, but obstacles include both technology and culture.

TRUE
48
15. Training in a virtual world can both lower costs and increase efficiency.

TRUE

16. Collaborative work management tools help people accomplish or manage individual work

activities.

FALSE

Collaborative work management tools help people accomplish or manage group work activities.

17. The term interactive marketing has been coined to describe a supply chain management process

that is based on using the Internet, intranets, and extranets to establish a two-way transactions

between a business and its customers.

FALSE

The term interactive marketing has been coined to describe a customer-focused management

process.

18. Increasingly, sales people are using Web browsers and contact management software to

connect to their company's marketing websites.

TRUE

19. Many companies view sales force tracking as a way to gain a strategic advantage in sales

productivity and marketing responsiveness.

FALSE

49
Many companies view sales force automation as a way to gain a strategic advantage.

20. Firms such as transportation companies, wholesalers, retailers, financial institutions, and service

companies must use production/operations information systems to plan and control their

operations.

TRUE

21. The overall goal of computer-integrated manufacturing is to segregate the production and

support processes.

FALSE

The overall goal of computer-integrated manufacturing is to integrate the production and support

processes.

22. Computer aided manufacturing systems are those that automate the production process, such

as employing humanlike robots to complete the step of painting the product being

manufactured.

TRUE

23. A process control computer system uses special sensing devices that measure physical

phenomena, such as temperature or pressure changes.

TRUE

24. Human resource information systems are designed to support most common human resource
(p. 292)
functions, such as recruitment, selection, hiring, job placement, performance appraisals, and

50
training over corporate intranets.

TRUE

25. Human resource management applications offered over corporate intranets can enable

managers and other employees to perform HRM tasks with little intervention by the HRM

department.

TRUE

26. Accounting information systems are among the newest, yet are the most widely used information

systems in business.

FALSE

Accounting information systems are among the oldest systems.

27. Operational accounting systems emphasize legal and historical record-keeping and the

production of accurate financial statements.

TRUE

28. According to the Real World case, some of Cisco's employees are full-time telecommuters, living

and working in places such as Illinois while telecommuting to the firm's offices in California.

TRUE

Whirlpool would like to work with a single vendor to provide the bulk of its supply chin needs.

51
Multiple Choice Questions

29. _______________ is defined as the use of the Internet and other networks and information

technologies to support electronic commerce, enterprise communication and collaboration, and

Web-enabled business processes, both within a networked enterprise and with customers and

business partners.

A. Electronic business

30. _______________ Systems cross the boundaries of traditional business functions in order to

reengineer and improve vital business processes all across the enterprise.

C. Cross-functional enterprise

31. Networked enterprises view _______________ systems as a strategic way to use IT to share

information resources and improve the efficiency and effectiveness of business processes.

C. cross-functional enterprise

32. Moving from mainframe-based legacy systems to integrated, cross-functional client/server


applications typically involves installing _______________ software.

D. all of the choices are correct.

52
33. Instead of focusing on the information processing requirements of business functions, enterprise

software focuses on supporting integrated clusters of _______________ involved in the operations

of a business.

B. business processes

34. A(n) _______________ architecture illustrates the inter-relationships of the major cross-functional

enterprise applications that many companies have, or are installing, today.

A. enterprise application

35. Which of the following applications focuses on the efficiency of a firm's internal production,

distribution, and financial processes?

B. Enterprise resource planning

36. Which of the following applications focuses on acquiring and retaining profitable customers via

marketing, sales, and service processes?

A. Customer relationship management

37. Which of the following applications focuses on developing the most efficient and effective

sourcing and procurement processes?

D. Supply chain management

38. Which of the following applications focuses on tools that support group collaboration and

decision support?

C. Knowledge management

53
39. Which of the following applications aims to acquire and retain partners who can enhance the

sale and distribution of a firm's products and services?

C. Partner Relationship Management

40. As described in the text, partner relationship management focuses on:

C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's

products and services

41. As described in the text, supply chain management focuses on:

A. Developing the most efficient and effective sourcing and procurement processes

42. According to the text, customer relationship management focuses on:

B. Acquiring and retaining profitable customers via marketing and delivery of timely products and

services

43. According to the text, enterprise resource planning focuses on:

C. The efficiency of a firm's internal production, distribution, and financial processes

44. As described in the text, knowledge management focuses on:

D. Providing a firm's employees with tools that support group collaboration and decision support

45. Enterprise application integration (EAI) software enables users to model the business processes

and interactions that should occur between:

D. Business applications

54
46. Enterprise application integration (EAI) software provides _______________ that performs data

conversion and subordination, and application communication and messaging services.

A. middleware

47. Distribution and manufacturing are _______________.

C. back office systems

48. _______________ Software can integrate the front-office and back office systems applications of

a business so they work together in a seamless, integrated way.

C. Enterprise application integration (EAI)

49. Customer service and sales order entry are _______________.

D. front office systems

50. _______________ are events that occur as part of doing business, such as sales, purchases,

deposits, withdrawals, refunds, and payments.

B. Transactions

51. A transaction is _______________.

B. any business event that must be captured and recorded

52. Transaction processing systems play a vital role in supporting the _______________ of an e-

business enterprise.

C. operations

55
53. Transaction processing systems are _______________ information systems that process data

resulting from the occurrence of business transactions.

D. cross-functional

54. Online transaction processing is considered a _______________ system because it captures and

processes transactions immediately.

D. real time

55. The first step of the transaction processing cycle is _______________.

D. data entry

56. _______________ update the corporate databases of an organization to reflect changes resulting

from day-to-day business transactions.

D. Transaction processing systems

57. Transaction processing systems process data in two basic ways: _______________ and

_______________.

B. Online/real-time processing, batch processing

58. _______________ systems are cross-functional information systems that enhance communication
(p. 281)
and coordination among the members of business teams and workgroups.

C. Enterprise collaboration

56
59. The capabilities and potential of _______________ are driving the demand for better enterprise

collaboration tools in business.

D. All of the choices are correct.

60. Electronic mail, voice mail, faxing, Web publishing, bulletin board systems, and paging are

considered _______________ tools.

A. electronic communication

61. Video-conferencing, chat systems, and discussion forums are considered _______________

tools.

C. electronic conferencing

62. Workflow systems, document sharing, and knowledge management are considered

_______________ tools.

B. collaborative work management

63. Which of the following is considered a collaborative work management tool?

A. Calendaring and scheduling

64. Which of the following is considered an electronic communications tool?

B. Instant messaging

65. Which of the following is considered an electronic conferencing tool?

C. Data conferencing

57
66. Training in a virtual world is effective, but obstacles include both _______________.

A. technology and culture

67. Training in a virtual world can both _______________.

D. lower costs and increase efficiency

68. _______________ Tools help people accomplish or manage group work activities.

C. Collaborative work management

69. Collaborative work management tools include all of the following except:

C. Faxing, paging, and bulletin board systems

70. A(n) _______________ business system is a type of information system that supports the

business functions of accounting, finance, marketing, operations management, and human

resource management.

A. functional

71. Marketing information systems can help marketing managers with:

D. All of the choices are correct.

72. Which of the following is considered a human resource business function?

A. Compensation analysis

58
73. Which of the following is considered a production/operations business function?

B. Process control

74. Which of the following is supported by the marketing business function?

D. Sales force automation

75. All of the following are supported by the accounting business function except:

C. Capital budgeting

76. Providing website visitors with chat rooms, Web forms and questionnaires, and e-mail

correspondence opportunities enables companies to use _______________ to encourage

customers to become involved in product development, delivery, and service issues.

B. interactive marketing

77. Targeted marketing includes all of the following components except:

C. Credit

78. Advertising and promotion efforts can be tailored to each visit to a site by an individual. This
(p. 288)
strategy is based on a variety of tracking techniques, such as Web "__________" files recorded

on the visitor's disk drive from previous visits.

C. Cookie

79. Many companies view sales force automation as a way to gain _______________ in sales

productivity and marketing responsiveness.

B. strategic advantage

59
80. _______________ information systems support the production/operations function that includes all

activities concerned with the planning and control of the processes producing goods and

services.

D. Manufacturing

81. Computer integrated manufacturing is an overall concept that stresses using computer-based

systems in manufacturing to do all the following, except:

D. Integrate collaboration and communication throughout the organization

82. Computer-integrated manufacturing systems do all the following for activities that are needed to

produce products, except:

C. segregate

83. The overall goal of computer-integrated manufacturing is to create flexible, agile, manufacturing

processes that do what?

C. Efficiently produce products of the highest quality.

84. Computer-integrated manufacturing systems support all of the following concepts except:

B. Inquiry processing

85. When a manufacturer automates production of a product by installing computer systems to


(p. 292)
monitor processes and robots to do some of the assembly tasks, it is an example of

____________________.

B. computer-aided manufacturing

60
86. When a manufacturer installs performance-monitoring information systems for factory floor

operations, it is an example of ____________________.

D. manufacturing execution systems

87. When a manufacturer uses computers to control ongoing physical processes, it is an example of

____________________.

C. process control

88. Machine control is the use of computers to control the actions of machines. This is also known

as ____________________.

A. numerical control

89. Accounting systems are among the ____________________, yet _______________ information

systems in business.

B. newest, most widely used

90. According to the text, _______________ emphasize legal and historical record-keeping and the

production of accurate financial statements.

A. operational accounting systems

91. Which of the six essential accounting business systems mentioned in the text reflects changes in

inventory and provides shipping and reorder information?

C. Inventory control

61
92. Which of the six essential accounting business systems mentioned in the text records purchases

from, amounts owed to, and payments to suppliers?

A. Accounts payable

93. Computer-based _______________ systems support business managers and professionals in

decisions concerning the financing of a business, and the allocation and control of financial

resources within a business.

B. financial management

Fill in the Blank Questions

94. Instead of focusing on the information processing requirements of business functions, enterprise

software focuses on supporting integrated clusters of business _______________ involved in the

operations of a business.

processes

95. An enterprise _______________ architecture illustrates the inter-relationships of the major cross-

functional enterprise applications that many companies have, or are installing, today.

application

96. _______________ Systems cross the boundaries of traditional business functions in order to

reengineer and improve vital business processes all across the enterprise.

Cross-functional enterprise

97. _______________ focuses on the efficiency of a firm's internal production, distribution, and

financial processes.

Enterprise resource planning

62
98. EAI software can integrate the front-office and ________________ applications of a business so

they work together in a seamless, integrated way.

back-office

99. A transaction is _______________.

any business event that must be captured and recorded

100. Transaction processing systems (TPS) are _______________ information systems that process

data resulting from the occurrence of business transactions.

cross-functional

101. Transaction processing systems process data in two basic ways: batch processing and

_______________ processing.

real-time or online

102. Many online systems depend on the capabilities of _______________ tolerant computer systems

that can continue to operate if parts of the system fail.

fault

103. Electronic conferencing options include electronic meeting systems and other group support
systems where team members can meet at the same time and place in a _______________ room

setting.

decision

104. The goal of interactive marketing is to enable a company to profitably use networks to attract and

___________ customers who will become partners with the business.

keep or retain

63
105. Advertising and promotion efforts can be tailored to each visit to a site by an individual. This

strategy is based on a variety of tracking techniques, such as Web "__________" files recorded

on the visitor's disk drive from previous visits.

cookie

106. The production/operations function is concerned with the management of the operational

processes and __________ of all business firms.

systems

107. _______________ is an overall concept that stresses that the objectives of computer-based

systems in manufacturing must be to simplify, automate, and integrate all production and support

processes.

Computer-integrated manufacturing (CIM)

108. Manufacturing information systems help companies plan the types of material needed in the

production process. This is called ____________________ planning (MRP).

material requirements

109. Manufacturing execution systems monitor, track, and control the five essential components in a

production process: materials, equipment, _______________, instructions and specifications, and

production facilities.

personnel

110. _______________ Control is the use of computers to control an ongoing physical process.

Process

111. Machine control is the use of computers to control the actions of machines. This is also popularly

known as _______________ control.

numerical

64
112. _______________ Information systems are designed to support planning to meet the personnel

needs of the business, development of employees to their full potential, and control all personnel

policies and programs.

Human resource

113. Human resource information systems support the strategic, tactical, and _______________ use of

the human resources of an organization.

operational

114. Management accounting systems focus on the planning and __________ of business operations.

control

115. The __________ budgeting process involves evaluating the profitability and financial impact of

proposed capital expenditures.

capital

116. _______________ planning software can help determine the financing needs of a business and

analyze alternative methods of financing.

Financial

117. EAI software can integrate _______________ and ________________ applications so they work

together in a seamless, integrated way.

front office; back office

118. Syntellect Interactive Services developed _______________ for cable pay-per-view systems.

online transaction processing system

65

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy