Principles of MIS Testbank
Principles of MIS Testbank
2. Information technology can help all kinds of businesses improve the efficiency and effectiveness of their business processes
and managerial decision making.
TRUE
3. Maintenance is one of the key activities in the development and management of a business information system.
TRUE
4. One system can be made up of other systems or can be a part of a bigger system.
TRUE
5. Smoke signals and library card catalogs are examples of an information system.
TRUE
6. The term "information technology" refers to all of the components and resources necessary to deliver the information and
functions of a system to an organization.
FALSE
The term "information technology" refers to the various hardware, software, networking, and data management components
necessary for the system to operate. "Information system" describes all of the components and resources necessary to deliver
its information and functions to the organization.
7. An information system can use hardware as simple as a pencil and paper to capture and store its data.
TRUE
8. Gaining a strategic advantage over competition requires the innovative application of information technologies.
TRUE
9. Integration of business systems allows greater flexibility and provides greater business support than any of the individual
systems could provide alone.
TRUE
10. Most retail stores now use computer-based information systems to keep track of inventory, but few use them to evaluate
sales trends.
FALSE
Most retail store now use computer-based information systems to both keep track of inventory and to evaluate sales trends.
11. Decision support systems (DSS) provide managerial end users with ad hoc and interactive support of their decision-making
processes.
TRUE
12. Expert systems can serve as consultants to users by providing expert advice in limited subject areas.
TRUE
13. An extranet is an Internet-like network inside the enterprise; an intranet is between the enterprise and its trading partners.
FALSE
An intranet is an Internet-like network inside the enterprise; an extranet is between the enterprise and its trading partners.
14. Enterprise collaboration systems involve the use of software tools to support e-commerce functions with customers and
suppliers.
FALSE
Enterprise collaboration systems involve the use of software tools to support communication, coordination, and collaboration
among the members of networked teams and workgroups.
1
15. A process control system is an example of an operation support system that records and processes data resulting from
business transactions.
FALSE
A transaction processing system is an example of an operation support system that records and processes data resulting from
business transactions.
16. In real-time processing, data are processed immediately after a transaction occurs.
TRUE
17. Management information systems (MIS) provide information in the form of reports and displays.
TRUE
18. An information system that supports accounting is an example of a functional business system.
TRUE
19. Information systems that focus on operational and managerial applications in support of basic business functions, such as
accounting, are known as strategic information systems.
FALSE
Information systems that focus on operational and managerial applications in support of basic business functions are known
as functional business systems.
20. An expert system can provide advice for operational chores, such as equipment diagnostics or loan portfolio management.
TRUE
21. Mismanagement or misapplication of information systems can ultimately result in business failure.
TRUE
22. A large-scale movement to outsource basic software programming functions to India, the Middle East, and Asia-Pacific
countries has resulted because U.S. programmers have been inadequately trained.
FALSE
Outsourcing software programming functions has resulted because of rising labor costs in North America, Canada, and
Europe.
23. Falling prices of computer hardware and software should continue to induce more businesses to expand their computerized
operations.
TRUE
24. Increased importance placed on cyber-security will reduce the need for workers skilled in information security.
FALSE
Increased importance placed on cyber-security will result in an increased need for workers skilled in information security.
25. The human body and an oil refinery can both be classified as systems.
TRUE
26. In order for something to be classified as a "system", a computerized environment must be involved.
FALSE
Many examples of systems can be found in the physical and biological sciences, technology, and human society.
28. A sales manager exercises control when reassigning salespersons to new territories after evaluating feedback about their sales
performance.
TRUE
29. An organization is considered an open system when it interfaces and interacts with other systems in its environment.
TRUE
2
30. Multiple systems never share an environment; each has its own.
FALSE
Several systems may share the same environment.
31. Information systems are just like any other system, but their value to the modern organization is unlike any other system ever
created.
TRUE
32. Anyone who uses an information system or the information it produces can be referred to as an end user.
TRUE
34. Optical disks and plastic cards are examples of hardware resources, but paper forms are not.
FALSE
Optical disks, plastic cards, and paper forms are all examples of hardware resources.
35. In the context of the information systems model, computer peripherals typically consist of hardware devices, such as
keyboards, and productivity tools, such as word processing software.
FALSE
Computer peripherals typically consist of hardware devices that allow the input, output, or storage of data; word processing
software is not a hardware resource.
36. In the context of the information systems model, data resources are typically organized as databases and expert systems.
FALSE
Data resources are typically organized as databases and knowledgebases.
37. In the context of the information systems model, information is subjected to a "value-added" process that converts it to data
that meet the needs of end users.
FALSE
In the context of the information systems model, data is subjected to a value-added process that converts it to information
that meets the needs of end users.
38. Data can be thought of as context independent. This means that a list of numbers or name by themselves do not provide an
understanding of the context in which they were recorded.
TRUE
39. Data are raw facts or observations, typically about physical phenomena or business transactions.
TRUE
40. In information systems activities, the processing of data resources typically takes the form of data entry activities.
FALSE
The input of data resources typically takes the form of data entry activities.
41. In information systems activities, a user interface commonly refers to a more convenient and efficient method of end-user
input and output with a computer system.
TRUE
42. Calculating employees' pay, federal taxes, and other payroll deductions is a business example of a computerized processing
activity.
TRUE
43. After data has been entered into a computerized information system, it is usually not necessary to correct or update it. That is
the benefit of a computerized system—once entered, always correct.
FALSE
The quality of any data stored in an information system must be maintained by a continual process of correcting and updating
activities.
3
Multiple Choice Questions
45. In its simplest form, a system consists of all the following except:
A. A group of cooperative users
46. According to the Real World case, eCourier embraced technology by:
D. Giving all their couriers handheld GPS units for tracking and communication.
Lufthansa plans to phase out the desktop computers that it had previously deployed in airports, thereby streamlining its
infrastructure and cutting costs.
47. According to the Real World case, eCourier uses SeeWhy software to:
48. According to the Real World Case, the goal of Bryan Cave is:
49. According to the Real World Case, the Bryan Cave law firm had difficulty billing its real estate customers because:
50. According to the Real World Case, the big problem facing the Bryan Cave law firm in 2002 was:
D. Making the highest profits from their resources while delivering the highest customer value.
52. According to the text, most retail stores today use computer-based information systems to support business processes and
operations. This support falls broadly into the categories of:
A. Business decisions and strategies for competitive advantage.
54. All of the following are fundamental reasons for business applications of information technology except:
4
55. According to the textbook case, Welch's uses BI software from Oco to:
56. According to the textbook case, the Oco BI software used by Welch's:
D. helps them even out the number of delivery trucks used each day of the week.
57. The expanding role of information systems from the 1950s to the present, in sequential order, are:
C. Data processing, management reporting, decision support, strategic and end user support, electronic business and
commerce
58. The rapid development of microcomputer processing power, application software packages, and telecommunications
networks gave birth to the phenomenon of _______________.
60. Companies generally rely on e-business applications to do all of the following except:
64. The text classifies information systems as either operations or management support information systems. Which one of the
following would not be classified as an operations support system?
65. Electronic commerce systems generally include all of the following except:
67. A nuclear power plant uses electronic sensors linked to computers to continually monitor processes and make instant (real-
time) adjustments that control the power generation process. This is an example of a(n) _______________.
68. When employees in a project team use email to send and receive messages and use video conferences to hold electronic
meetings and coordinate their activities, they are using _______________.
69. A database of customer purchases that provides end-user managers with interactive and ad hoc decision-making support is
referred to as _______________.
70. A production manager needs a system to help determine how much product to manufacture based on the expected sales
associated with a future promotion, plus the location and availability of the raw materials necessary to manufacture the
product. What type of system would meet this manager's needs?
71. When information system applications focus on providing information and support for effective decision making by managers,
they are called _______________ support systems.
B. management
72. An information system that supports the business functions of accounting, finance, human resource management, marketing,
or operations would be classified as a(n) _______________ system.
A. functional business
73. Information systems that focus on operational and managerial applications in support of basic business functions, such as
accounting or marketing, are known as _______________.
A. functional business systems
75. Executive information systems (EIS) are tailored to meet the strategic information needs of which of the following
management levels?
A. Top management (strategic)
6
76. Business applications of information systems are typically combinations of several types of information systems. This
integration is referred to as _______________ systems.
C. cross-functional informational
77. Success in today's dynamic business environment depends heavily on maximizing the use of Internet-based technologies and
Web-enabled information systems to meet the competitive requirements of _______________.
78. A functional business system supports all of the following types of applications except:
D. Expert
80. According to the textbook case on responsibility and accountability, even if a project is not an IT project, who is held
responsible for optimizing returns on IT-related investments?
D. CIO
B. IT is never 100% responsible for any large project involving information technology.
82. Developing an information system solution involves all of the following steps except:
C. Redesign
83. Computer-based information systems are usually conceived, designed, and implemented using some form of systematic
development process. The investigation stage includes _______________.
A. determining the economic or technical feasibility of a proposed application
84. Developing information system solutions to business problems in an organization is the responsibility of _______________.
85. When applying a systematic development process for computer-based information systems, _______________ would be part
of the analysis phase.
A. determining the business requirements of the system
86. According to the text, the steps of developing an information system, in their proper order, are:
88. The information systems function is equally as important to business success as the function of _______________.
90. According to the Real World case about the New York Times, the newspaper industry is in very deep trouble. What has
become most important to them?
A. Business model innovation
91. If a system is one of the components of a larger system, it is considered a(n) _______________.
C. subsystem
92. A system that can change itself or its environment in order to survive is _______________ system.
D. an adaptive
93. Organizations are examples of _______________ systems because they interface and interact with other systems in their
environment.
B. open
C. open adaptive
D. Time
97. All of the following would be considered a software resource in an information system except:
C. A telecommunication network
8
98. In an information system context, which one of the following would be the most applicable description of application
software?
99. In an information system, alphanumeric data normally takes the form of _______________.
A. numbers and alphabetical characters
100. In an information system, image data normally takes the form of _______________.
103. All of the following normally happens to data during a value-added process except:
104. All of the following are considered computer hardware technology except:
C. Subtotals do not add up to total sales; IT staff investigates whether data entry or processing is the problem
D. Source document
9
Fill in the Blank Questions
108. An _______________ system is an organized combination of people, hardware, software, telecommunications networks, and
data resources that collects, transforms, and disseminates information in an organization.
information
109. With a strategic information system (SIS), information technology becomes an integral part of business processes, products,
and _______________.
services
110. _______________ is defined as the use of Internet technologies to work and empower business processes, electronic
commerce, and enterprise collaboration within a company and with its customers, suppliers, and other business stakeholders.
E-business
111. Enterprise collaboration systems use software tools to support _______________ among the members of networked teams
and workgroups.
communication, coordination, or collaboration
112. During the 1980s and 1990s, information technology helped companies gain a competitive advantage in the global
marketplace. This is referred to as the _______________ information systems concept.
strategic
113. A _______________ team uses a corporate intranet and the Internet for electronic mail, videoconferencing, electronic
discussion groups, and Web pages of work-in-progress information to collaborate on business projects.
virtual
114. Electronic _______________ is the buying, selling, marketing, and servicing of products, services, and information over a
variety of computer networks.
commerce
115. Types of information systems are generally classified as either operations information systems or _______________
information systems.
management
116. Marketing and selling books to consumers over the Internet is an example of _______________ commerce.
electronic or Internet or "E-"
117. A system that controls the industrial processes of an organization would be classified as a(n) _______________ support
system.
operations
118. Transaction processing systems process transactions in two basic ways, _______________ processing or real-time.
batch
119. When a manager uses an interactive, computer-based information system to assist in his/her decision making, the manager is
using a _______________ support system.
decision
120. A system that provides pre-specified reports for the managers of an organization would be classified as a _______________
system.
management
121. Enterprise collaboration systems enhance team and workgroup communication and productivity, and include applications that
are sometimes called office _______________ systems.
automation
10
122. The goal of knowledge management systems (KMS) is to help knowledge workers create, organize, and _______________
important business knowledge wherever and whenever it is needed.
share
123. The success of an information system should be measured by both its efficiency and its _______________.
effectiveness
124. The design of an information system application is based on an _______________ of the business requirements of an
organization.
analysis
125. As a manager, you must be aware of what uses of information technology might be considered improper, irresponsible, or
harmful to individuals or to society. This dimension of the use of information technology is referred to in the text as an
_______________ responsibility.
ethical
126. A manufacturing system accepts raw materials as input and produces finished goods as output. An information system accepts
data as input and processes them into _______________ as output.
information
127. A system with feedback and _______________ functions is sometimes called a cybernetic system.
control
128. The _______________ component in a cybernetic system refers to the data about the performance of the system.
feedback
130. _______________ involves monitoring and evaluating feedback to determine whether a system is moving toward the
achievement of its goal.
Control
131. People, hardware, software, __________, and networks are the five basic resources of information systems.
data
132. Information processing consists of the system activities of input, processing, output, _______________, and control.
storage
133. In the context of the information system model, software resources include the sets of operating instructions called
_______________, which direct and control computer hardware.
programs
134. In the context of the information systems model, _______________ are the operating instructions for the people who will use
an information system. Examples are instructions for filling out a paper form or using a software package.
procedures
135. Information in various forms is transmitted to end users and made available to them in the _______________ activity.
output
137. _______________ is the information systems activity in which data and information are retained in an organized manner for
later use.
Storage
11
138. In an information system, the _______________ activity would be considered the component that evaluates feedback in order
to determine whether the system is moving toward the achievement of its goal.
control
1. Variable-length records contain a variable number of fields with fixed field lengths.
FALSE
Variable-length records contain both a variable number of fields and variable field lengths.
2. When independent of any other files related to it, a single table is referred to as a compressed file.
FALSE
When independent of any other files related to it, a single table is referred to as a flatfile.
3. Files are frequently classified by the application for which they are primarily used, such as a payroll file or an inventory file.
TRUE
5. Databases contain data elements that describe both entities and the relationships among entities.
TRUE
6 Database management packages based on the relational model can link data elements from various tables to provide
information to users.
TRUE
7. The project operation is used to create a subset of the columns contained in the temporary tables created by the select and
join operations.
TRUE
8. A major benefit of multidimensional databases is that they are a compact and easy-to-understand way to visualize and
manipulate data elements that have many interrelationships.
TRUE
9. Multidimensional databases have become the least popular structure for analytical databases that support online analytical
process (OLAP) applications, in which fast answers to complex queries are expected.
FALSE
Multidimensional databases are the most popular database structure for OLAP applications.
10. The multidimensional database structure is considered one of the key technologies of a new generation of Web-based
applications.
FALSE
The object-oriented model is one of the key technologies of a new generation of Web-based applications.
11. A database with a network data structure can easily handle a many-to-many data relationship, whereas a hierarchical model
cannot.
TRUE
12. The network model can easily handle ad hoc requests for information, whereas the hierarchical model cannot.
FALSE
Because its relationships must be specified in advance, the network model is unable to handle ad hoc requests for
information.
12
13. All of the relationships between the data elements in a relationally organized database need to be specified when the
database is created.
FALSE
Not all of the relationships between data elements need to be specified when the database is created. Database management
software can create new tables of data relationships by using parts of the data from existing tables.
14. Relational databases are more difficult for programmers to work with and more difficult to maintain than the hierarchical and
network models.
FALSE
Because database management software can create new tables of data relationships from existing tables, relational databases
are easier for programmers to work with and maintain than the hierarchical and network models.
15. Large organizations usually place control of enterprise-wide database development in the hands of database administrators
(DBAs) and other database specialists.
TRUE
16. An active data dictionary will prevent a data entry program from using a nonstandard definition of a customer record.
TRUE
17. A data model serves as a logical framework on which to base the physical design of a database.
TRUE
18. Distributed databases can reside on network servers on the World Wide Web, on corporate intranets, or on corporate
extranets.
TRUE
19. A large database system is often distributed into smaller databases based on some logical relationship between the data and
the location of the databases.
TRUE
20. In a distributed database system, each location gains control of its local data, but loses access to data in other locations.
FALSE
Each location has control of its local data, but all locations can access any other database in the company.
21. One drawback to the database duplication process is that no changes can ever be made to any database other than the
master. Otherwise, local changes will be overwritten during the duplication process.
TRUE
22. Distributed databases require fewer resources when it comes to computing power and bandwidth.
FALSE
Distributed databases require extra computing power and bandwidth to access multiple databases in multiple locations.
23. In a traditional file processing approach, each business application is designed to use one or more specialized data files
containing only specific types of data records.
TRUE
24. Having data in independent files makes it easier to provide end users with information for ad hoc requests.
FALSE
Having data in independent files makes it difficult to provide end users with information for ad hoc requests.
25. In file processing systems, application programs typically contain references to the specific format of the stored data.
TRUE
26. In file processing systems, it was easy for data elements, such as stock numbers and customer addresses, to be defined
differently by different end users and applications.
TRUE
13
27. Boolean logic was developed during the latter part of the 1900s.
FALSE
Boolean logic was developed by George Boole in the mid-1800s.
28. The Internet is nothing more than the world's largest database.
TRUE
30. In all information systems, data resources must be organized and structured in some logical manner, so that they can be:
31. From a logical point of view, a(n) _______________ is the smallest data element that can be observed and manipulated.
A. character
D. attributes
33. All the fields used to describe the attributes of an entity are grouped to form a(n) _______________.
B. record
C. table
37. When independent of any other files related to it, a single table is referred to as a(n):
B. Flat file
C. database
14
39. Databases contain data elements that describe both entities and the _______________ among entities.
A. relationships
40. Database management packages based on the _______________ model can link data elements from various tables to provide
information to users.
B. relational
41. Early mainframe DBMS packages used the _______________ structure, in which all records are dependent and arranged in
multilevel structures, consisting of one root record and any number of subordinate levels.
C. hierarchical
42. In a(n) _______________ database structure, all of the relationships among records are one-to-many, because each data
element is related to only one element above it.
A. hierarchical
43. Which database model allows many-to-many relationships among records so that a data element can be accessed by following
one of several paths?
B. Network
44. The _______________ model is the most widely used database structure today.
C. relational
45. In the relational database model, all data elements within the database are viewed as being stored in the form of simple two-
dimensional tables, sometimes referred to as _______________.
D. relations
46. The tables in a relational database are flat files which have rows and columns. Each row represents a _______________ in the
file.
B. record
47. The tables in a relational database are flat files which have rows and columns. Each column represents a _______________ in
the file.
A. field
15
48. The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the
select and join operations.
C. project
49. Using a relational database, a user can temporarily combine two or more tables so that he/she can see relevant data in a form
that looks like it is in one big table. This is the _______________ operation.
A. join
50. _______________ is the most commonly used database application for the PC.
B. Microsoft Access
51. _______________ databases have become the most popular structure for analytical databases that support online analytical
process (OLAP) applications, in which fast answers to complex queries are expected.
D. Multidimensional
52. The _______________ database structure is considered one of the key technologies of a new generation of Web-based
applications.
C. object-oriented
53. The object-oriented database model supports _______________. That is, new objects can be automatically created by
replicating some or all of the characteristics of one or more parent objects.
A. inheritance
55. Which database structure works effectively with complex data types, such as video clips, audio segments, and other subsets of
Web pages, and is considered one of the key technologies of Web-based applications?
C. Object-oriented
56. A database with a(n) _______________ data structure can easily handle a many-to-many data relationship.
B. network
57. A database with a(n) _______________ data structure can easily handle ad hoc requests for information.
C. relational
16
58. According to one database pioneer, the future development of databases and data warehouses will depend on
_______________.
B. columns
59. Large organizations usually place control of enterprise-wide database development in the hands of _______________.
A. Database administrators (DBAs)
60. According to the text, most data warehouses will run _______________ in a column format.
B. 50 times faster
61. Database administrators and database design analysts work with end users and systems analysts to do all of the following
except:
D. Enter live data into the system until it has proven to be reliable
62. _______________ are used to model the relationships among the many entities involved in business processes.
A. Entity-relationship diagrams
64. The _______________ stage of database development translates the conceptual models into the data model of a DBMS.
D. logical design
65. A _______________ is an overall logical view of the relationships among the data elements in a database.
A. schema
66. A _______________ is an overall logical view of the relationships needed to support specific end-user application programs
that will access the database.
B. subschema
67. According to the textbook case, the innovation of the open-source product Hadoop is _______________.
17
68. According to the textbook case, file processing in Hadoop is not halted by hardware failures because _______________.
69. Operational databases store the detailed data needed to support the business processes and operations of a company. They
are also called _______________.
71. Which of the following statements concerning the replication and duplication process for updating distributed databases is
correct?
C. Replication is the more complicated process because it must find changes in each distributed database and make
appropriate changes to make each database identical
72. What type of databases are employees using when they access online data banks, whether those data banks are free or paid
for through subscriptions?
C. External databases
73. A central source of data that have been cleaned, transformed, and cataloged so that they can be used for business analysis,
market research, and decision support is called a _______________.
B. data warehouse
74. A data warehouse contains data that have been processed in all the following ways except:
A. Separated
18
77. Which of the following is a legitimate use for data mining?
78. All of the following contribute to problems when using a file management approach except:
C. Data independence
79. Database management involves the use of database management software to control how databases are _______________.
80. In mainframe and server computer systems, the database management system controls the _______________ of the
databases of computer-using organizations.
81. All of the following are major functions of a database management system except:
82. Database development involves defining and organizing the _______________ of the data needed to build a database.
A. structure
B. Transaction processing systems and other end user applications, with the support of the DBMS
87. Many end users have trouble correctly phrasing database language search queries, so most end-user DBMS packages now
offer _______________ methods.
C. GUI
19
Fill in the Blank Questions
88. All of the fields used to describe the attributes of an entity are grouped to form a _______________.
record
89. _______________ contain both a variable number of fields and variable field lengths.
Variable-length records
90. _______________ contain both a fixed number of fields and fixed field lengths.
Fixed-length records
93. Databases contain data elements that describe both entities and the _______________ among entities.
relationships
94. In the relational database model, all data elements within the database are viewed as being stored in the form of simple, two-
dimensional tables, sometimes referred to as _______________.
relations
95. The tables in a relational database are flat files, which have rows and columns. Each row presents a single _______________
in the file.
record
96. The tables in a relational database are flat files, which have rows and columns. Each column represents a _______________.
field
97. The _______________ operation is used to create a subset of the columns contained in the temporary tables created by the
select and join operations.
project
98. An _______________ consists of data values describing the attributes of an entity, plus the operations that can be performed
upon the data.
object
99. A weakness in the hierarchical model is that it cannot handle _______________ data relationships.
many-to-many
100. A weakness in the network model is that it cannot handle _______________ for information.
ad hoc requests
101. A database of data definitions and specifications is called a metadata repository, or a _______________.
data dictionary
102. Database administrators and designers work with corporate and end user management to develop an _______________
model that defines the basic business process of the enterprise.
enterprise
103. _______________ relationship diagrams are used to model the relationships among the many entities involved in business
processes.
Entity
20
104. A _______________ is an overall logical view of the relationships among the data elements in a database.
schema
105. _______________ database design takes a physical view of the data that describes how data are to be physically stored and
accessed on the storage devices of a computer system.
Physical
106. Data models represent _______________ views of the data and relationships of the database.
logical
107. Entity Relationship Diagrams are _______________ of the various files and their relationships within a database system.
graphical models
108. A website stores hyperlinked pages of multimedia (text, graphics, photographs, video, and audio) in a _______________
database.
hypermedia
109. The duplication process basically identifies one database as a _______________ and then duplicates that database at a
prescribed time so that each distributed location has the same data.
master
110. Data warehouses may be subdivided into _______________, which hold subsets of data from the warehouse that focus on
specific aspects of a company, such as a department or a business process.
data marts
111. _______________, data that define the data in the data warehouse, are stored in a metadata repository and cataloged by a
metadata directory.
Metadata
112. In _______________, the data in a data warehouse are analyzed to reveal hidden patterns and trends in historical business
activity.
data mining
113. To solve the problems encountered with the file processing approach, the _______________ management approach was
conceived. It is the foundation of modern methods of managing organizational data.
database
114.) Database _______________ involves using transaction processing systems and other tools to add, delete, update, and correct
the data in a database.
maintenance
115. SQL is an acronym for _______________. It is an international standard query language found in many DBMS packages.
Structured Query Language
117. Boolean logic consists of three logical operators: AND, OR, and _______________.
NOT
21
(Chapter 6)
1. A change in technology often induces social, political, and economic system changes long
FALSE
Until a critical mass of users is reached, a change in technology only affects the technology.
regulated monopolies.
FALSE
The opposite is true; the telecommunications industry has gone from government-regulated
systems to be isolated.
FALSE
22
4. Business-to-business electronic commerce websites can be used by businesses to establish
TRUE
5. The Internet has a central computer system that is the most powerful in the world.
FALSE
6. The Internet provides electronic discussion forums and bulletin board systems that are formed
TRUE
7. Booking a reservation over the Internet costs an airline about 50 percent less than booking the
FALSE
Booking a reservation over the Internet costs an airline about 90 percent less than booking the
TRUE
23
9. Intranets seldom have much impact on communications and collaboration within an enterprise.
FALSE
10. Software that is installed on intranet Web servers can be accessed by employees within the
company or by external business partners who are using Web browsers, if access is allowed by
the company.
TRUE
11. If access to data is not restricted with passwords and other security mechanisms, the integrity of
TRUE
12. An extranet is a network inside a company that uses Internet technologies to provide a private
FALSE
13. Web browser technology makes customer and supplier access of intranet resources a lot easier
TRUE
14. A client/server network of several interconnected local area networks can replace a large
TRUE
24
15. The network-centric concept views the PC as the central computing resource of any computing
environment.
FALSE
The network-centric concept views networks as the central computing resource of any computing
environment.
16. In the central server architecture of P2P networking, the P2P software connects your PC to a
TRUE
17. In the pure peer-to-peer architecture of P2P networking, the P2P software connects your PC to a
FALSE
In the central server architecture of P2P networking, the P2P software connects your PC to a
18. The Internet, as originally conceived in the late 1960s, was a pure peer-to-peer system.8
FALSE
19. The unique achievement of Napster was the empowerment of the peers, in association with a
TRUE
25
20. Output from analog devices must be converted into digital form in order to input it into a
computer.
TRUE
21. Today, ordinary telephone wire is the least used medium for telecommunications.
FALSE
Ordinary telephone wire is still the most widely used medium for telecommunication.
22. Newly developed optical routers will be able to send optical signals up to 2,500 miles without
regeneration.
TRUE
23. Communications satellites can use microwave radio as their telecommunications medium.
TRUE
24. PCS phone systems cost substantially more to operate and use than cellular systems, but have
FALSE
PCS phone systems cost substantially less to operate and use than cellular system, and they
25. Wi-Fi is faster and less expensive than Standard Ethernet and other common wire-based LAN
technologies.
TRUE
26
26. A Bluetooth chip is designed to replace cables; it takes the information normally carried by a
(
cable and transmits it to a receiver Bluetooth chip.
TRUE
27. In frequency division multiplexing (FDM), a multiplexer effectively divides one high-speed
FALSE
28. Multiplexers work to increase the number of transmissions possible, while also increasing the
FALSE
Multiplexers work to increase the number of transmissions possible without increasing the
TRUE
teleprocessing monitors.
TRUE
31. The Open System Interconnection (OSI) model was officially adapted as an international
TRUE
27
32. The Internet uses a system of telecommunications protocols that have become so widely used
TRUE
127.154.95.6.
TRUE
34. IP addressing can identify a particular PC connected to the Internet, but not the network to which
it is attached.
FALSE
IP addressing can identify a specific network because the IP space is divided into three address
35. Skype software allows telephone conversations through a PC and over the Internet instead of a
TRUE
36. Each IP address is divided into three address classes, which are A, B, and C. Class C addresses
are normally owned by large Internet service providers or major corporations.
FALSE
Class A addresses are normally owned by large Internet service providers or major corporations.
37. New technologies are extending IP addresses beyond computers to TVs, toasters, and
coffeemakers.
TRUE
28
38. Developed to work Internet2, IPv6 increases the IP address size from 32 bits to 256 bits to
FALSE
TRUE
40. Voice over IP is a technology that allows a remote worker to function as if he or she were directly
TRUE
41. Skype users can call to any non-computer-based landline or mobile telephone in the world for
FALSE
Calls made to non-computer-based landlines or mobile telephones via Skype are free.
FALSE
43. Narrow-band channels typically use microwave, fiber optics, or satellite transmission.
FALSE
29
46. Regular telephone service relies on Packet Switching, while the Internet relies on Circuit
Switching.
FALSE
Regular telephone service relies on Circuit Switching, while the Internet relies on Packet
Narrow-band channels are usually unshielded twisted-pair lines used for telephone and modem
communications.
44. Frame relay technology is slower than X.25 and not as well suited to handle the heavy
FALSE
45. Although we tend to think of the FCC as the oversight body for radio and television, it is equally
TRUE
30
Switching.
47. Packet Switching involves dividing a message into multiple packets which are transmitted over a
TRUE
FALSE
Multiple Choice
_______________.
51. A network with 100 nodes has 9,900 possible connections. A network with 1,000 nodes has
B. 999,000
A. The usefulness or utility of a network equals the square of the number of users
31
53. A change in technology induces social, political, and economic system changes
_______________.
56. Programming that serves to "glue together" or mediate between two separate, and usually
C. middleware
57. Local and global telecommunications networks are rapidly converting to digital transmission
technologies. Digital technology provides all of the following benefits over analog technology
except:
32
58. Telecommunications networks now play vital and pervasive roles in Web-enabled
_______________.
C. The purpose of Internet2 is to build a roadmap that can be followed during the next stage of
60. Most of the institutions and commercial partners on the Internet2 network are connected via
A. Abilene
61. Traveling salespeople and those at regional sales offices can use the Internet, extranets, and
other networks to transmit customer orders from their laptop or desktop PCs, thus breaking
_______________ barriers.
D. geographic
62. Telecommunications-based business applications can help a company overcome all of the
33
63. All of the following statements about the Internet revolution are true except:
B. The central computer system of the Internet is the most powerful communications center in
the world
64. Which of the following statements regarding Internet Service Providers is correct?
A. ISPs provide individuals and organizations with access to the Internet for a fee
C. access points
67. Applications that use the Internet and Internet-based technologies are typically less expensive to
68. Most companies are building e-business and e-commerce websites to achieve all of the following
goals except:
34
69. An _______________ is a network inside an organization that uses Internet technologies to
C. intranet
70. An _______________ is a network link that uses Internet technologies to interconnect the intranet
of a business with the intranets of its customers, suppliers, or other business partners.
A. extranet
72. All of the following would typically be supported by an organization's intranet information portal
except:
D. Recruitment
73. The comparative _______________ of publishing and accessing multimedia business information
internally via intranet websites has been one of the primary reasons for the explosive growth in
35
74. Based on the information presented in the text, telecommunications terminals are best described
as:
A. Any input/output device that uses telecommunications networks to transmit or receive data,
including telephones
75. The text lists five basic categories of components in a telecommunications network. One of these
77. A network that covers a large geographic distance, such as a state or a country, is considered a
_______________ network.
D. wide area
36
78. Which of the following best describes a local area network?
B. A network that connects computers within a limited physical area, such as inside a single
building
79. To communicate over a network, each PC usually has a circuit board called a _______________.
80. All of the following statements about a virtual private network are correct except:
82. Older, traditional mainframe-based business information systems are called _______________
systems.
C. legacy
83. Most Linux distributions are released via BitTorrent to help with _______________ needs.
B. bandwidth
37
84. The Internet, as originally conceived in the late 1960's was a _______________ system.
D. peer-to-peer
86. A communications medium that consists of one or more central wires surrounded by thick
A. coaxial
88. Fiber optics uses cables consisting of one or more hair-thin filaments of __________ fiber
A. glass
89. Fiber optics are regarded as the communications media of the future, primarily due to its
_______________.
38
90. As it relates to telecommunications media, the problem of the last mile is:
91. Which of the following technologies transmits data at the fastest rate?
B. Cable modem
_______________.
B. router
39
95. In telecommunications networks, multiplexers:
96. Network management package functions include all of the following except:
97. Security is a top concern of network management today, so telecommunications software must
D. Central processing
98. A network configuration that consists of a central computer system with a number of smaller
computers tied directly to it, but not to each other, is a _______________ network.
D. star
99. Which of the following best describes how star, ring, and bus networks differ?
100. A(n) _______________ is a standard set of rules and procedures for the control of communication
in a network.
C. protocols
40
101. Which one of the following statements regarding a telecommunications network is false?
102. The _______________ layer in an OSI model provides communications services for end users.
A. application
103. In an OSI model, the _______________ layer does the routing and forwarding.
C. network
104. When IP was first standardized, the specification required that each system attached to the
D. 32-bit
105. All of the following statements regarding Internet telephony are correct except:
106. Communications channels such as microwave, fiber optics, or satellite transmission that provide
A. broadband
41
107. ATM (asynchronous transfer mode) is an emerging high-capacity __________ switching
technology.
C. cell
108. VoIP works by digitizing a voice signal, chopping it into __________, and then sending them over
B. packets
109. IPv4, the current Internet addressing protocol, can accommodate about _______________
addresses.
B. 4 billion
110. _______________ systems are information systems that use common standards for hardware,
Open
111. Open systems provide greater _______________. That is, the ability of networked computers and
other devices to easily access and communicate with each other and share information.
connectivity
42
112. Internet2 is all about high-speed telecommunications and infinite _______________.
bandwidth
113. We can think of the _______________ as a network made up of millions of smaller, private
networks, each with the ability to operate independent of, or in harmony with, all the other
Internet
114. Companies can create private secure Internet links between themselves, called _______________
private networks.
virtual
116. Devices such as modems, switches, and routers, which support data transmission and reception
processors
117. Thin clients provide a browser-based user interface for processing small application programs
called _______________.
applets
three-tier
43
119. The terms analog and _______________ refer to the methods used to convert information into an
digital
120. If the temperature being measured by an electronic analog thermometer is 83 degrees, the
121. Dense wave division multiplexing (DWDM) can split a strand of glass fiber into _____ channels,
40
122. Terrestrial microwave involves earthbound microwave systems that transmit high-speed
miles apart.
radio
123. All cellular and PCS telephone systems divide a geographic area into small areas, or
cells
124. Smart telephones, pagers, PDAs, and other portable communications devices have become very
wireless
125. The WAP standard specifies how Web pages in HTML and XML are translated into a wireless
filter
44
126. _______________ are the most common type of communications processor.
Modems
127. A modem converts digital signals into analog frequencies and then back again. This process is
demodulation
128. The main idea in OSI is that the process of communication between two endpoints in a
layers
129. The first part of an Internet address identifies the network on which the host resides, while the
host
130. Regular telephone service relies on circuit _______________, in which a switch opens a circuit to
establish a link between a sender and receiver. It remains open until the communication session
is completed.
switching
131. In the X.25 protocol, packets are _____ characters long, while in frame relay technology they are
of variable length.
128
45
Chapter 7
order to reengineer and improve vital business processes all across the enterprise.
TRUE
FALSE
share information resources and improve the efficiency and effectiveness of business processes.
FALSE
Enterprise resource planning concentrates on the efficiency and effectiveness of a firm's internal
4. Knowledge management applications focus on providing a firm's employees with tools that
FALSE
Knowledge management applications provide a firm's employees with tools that support group
46
5. Enterprise application integration (EAI) software enables users to model the business processes
TRUE
6. Enterprise application integration (EAI) software provides legacy systems that perform data
FALSE
Enterprise application integration (EAI) software provides middleware that performs data
7. Distribution and manufacturing are considered front office systems; customer service and sales
FALSE
Distribution and manufacturing are back office systems; customer service and sales order entry
8. The integration of enterprise application clusters has little, if any, impact on customer call center
responsiveness.
FALSE
The integration of enterprise application clusters has been shown to dramatically improve
customer call center responsiveness and effectiveness.
47
9. Transaction processing systems play a vital role in supporting the operations of an e-business
enterprise.
TRUE
10. Online transaction processing (OLTP) is generally considered a post-event system because
FALSE
11. Transaction processing systems update the corporate databases of an organization to reflect
TRUE
12. Transaction reports can take the form of a transaction listing, such as a payroll register.
TRUE
13. Enterprise collaboration systems are cross-functional e-business systems that enhance
communication, coordination, and collaboration among the members of business teams and
workgroups.
TRUE
14. Training in a virtual world is effective, but obstacles include both technology and culture.
TRUE
48
15. Training in a virtual world can both lower costs and increase efficiency.
TRUE
16. Collaborative work management tools help people accomplish or manage individual work
activities.
FALSE
Collaborative work management tools help people accomplish or manage group work activities.
17. The term interactive marketing has been coined to describe a supply chain management process
that is based on using the Internet, intranets, and extranets to establish a two-way transactions
FALSE
The term interactive marketing has been coined to describe a customer-focused management
process.
18. Increasingly, sales people are using Web browsers and contact management software to
TRUE
19. Many companies view sales force tracking as a way to gain a strategic advantage in sales
FALSE
49
Many companies view sales force automation as a way to gain a strategic advantage.
20. Firms such as transportation companies, wholesalers, retailers, financial institutions, and service
companies must use production/operations information systems to plan and control their
operations.
TRUE
21. The overall goal of computer-integrated manufacturing is to segregate the production and
support processes.
FALSE
The overall goal of computer-integrated manufacturing is to integrate the production and support
processes.
22. Computer aided manufacturing systems are those that automate the production process, such
as employing humanlike robots to complete the step of painting the product being
manufactured.
TRUE
23. A process control computer system uses special sensing devices that measure physical
TRUE
24. Human resource information systems are designed to support most common human resource
(p. 292)
functions, such as recruitment, selection, hiring, job placement, performance appraisals, and
50
training over corporate intranets.
TRUE
25. Human resource management applications offered over corporate intranets can enable
managers and other employees to perform HRM tasks with little intervention by the HRM
department.
TRUE
26. Accounting information systems are among the newest, yet are the most widely used information
systems in business.
FALSE
27. Operational accounting systems emphasize legal and historical record-keeping and the
TRUE
28. According to the Real World case, some of Cisco's employees are full-time telecommuters, living
and working in places such as Illinois while telecommuting to the firm's offices in California.
TRUE
Whirlpool would like to work with a single vendor to provide the bulk of its supply chin needs.
51
Multiple Choice Questions
29. _______________ is defined as the use of the Internet and other networks and information
Web-enabled business processes, both within a networked enterprise and with customers and
business partners.
A. Electronic business
30. _______________ Systems cross the boundaries of traditional business functions in order to
reengineer and improve vital business processes all across the enterprise.
C. Cross-functional enterprise
31. Networked enterprises view _______________ systems as a strategic way to use IT to share
information resources and improve the efficiency and effectiveness of business processes.
C. cross-functional enterprise
52
33. Instead of focusing on the information processing requirements of business functions, enterprise
of a business.
B. business processes
34. A(n) _______________ architecture illustrates the inter-relationships of the major cross-functional
A. enterprise application
35. Which of the following applications focuses on the efficiency of a firm's internal production,
36. Which of the following applications focuses on acquiring and retaining profitable customers via
37. Which of the following applications focuses on developing the most efficient and effective
38. Which of the following applications focuses on tools that support group collaboration and
decision support?
C. Knowledge management
53
39. Which of the following applications aims to acquire and retain partners who can enhance the
C. Acquiring and retaining partners who can enhance the selling and distribution of a firm's
A. Developing the most efficient and effective sourcing and procurement processes
B. Acquiring and retaining profitable customers via marketing and delivery of timely products and
services
D. Providing a firm's employees with tools that support group collaboration and decision support
45. Enterprise application integration (EAI) software enables users to model the business processes
D. Business applications
54
46. Enterprise application integration (EAI) software provides _______________ that performs data
A. middleware
48. _______________ Software can integrate the front-office and back office systems applications of
50. _______________ are events that occur as part of doing business, such as sales, purchases,
B. Transactions
52. Transaction processing systems play a vital role in supporting the _______________ of an e-
business enterprise.
C. operations
55
53. Transaction processing systems are _______________ information systems that process data
D. cross-functional
54. Online transaction processing is considered a _______________ system because it captures and
D. real time
D. data entry
56. _______________ update the corporate databases of an organization to reflect changes resulting
57. Transaction processing systems process data in two basic ways: _______________ and
_______________.
58. _______________ systems are cross-functional information systems that enhance communication
(p. 281)
and coordination among the members of business teams and workgroups.
C. Enterprise collaboration
56
59. The capabilities and potential of _______________ are driving the demand for better enterprise
60. Electronic mail, voice mail, faxing, Web publishing, bulletin board systems, and paging are
A. electronic communication
61. Video-conferencing, chat systems, and discussion forums are considered _______________
tools.
C. electronic conferencing
62. Workflow systems, document sharing, and knowledge management are considered
_______________ tools.
B. Instant messaging
C. Data conferencing
57
66. Training in a virtual world is effective, but obstacles include both _______________.
68. _______________ Tools help people accomplish or manage group work activities.
69. Collaborative work management tools include all of the following except:
70. A(n) _______________ business system is a type of information system that supports the
resource management.
A. functional
A. Compensation analysis
58
73. Which of the following is considered a production/operations business function?
B. Process control
75. All of the following are supported by the accounting business function except:
C. Capital budgeting
76. Providing website visitors with chat rooms, Web forms and questionnaires, and e-mail
B. interactive marketing
C. Credit
78. Advertising and promotion efforts can be tailored to each visit to a site by an individual. This
(p. 288)
strategy is based on a variety of tracking techniques, such as Web "__________" files recorded
C. Cookie
79. Many companies view sales force automation as a way to gain _______________ in sales
B. strategic advantage
59
80. _______________ information systems support the production/operations function that includes all
activities concerned with the planning and control of the processes producing goods and
services.
D. Manufacturing
81. Computer integrated manufacturing is an overall concept that stresses using computer-based
82. Computer-integrated manufacturing systems do all the following for activities that are needed to
C. segregate
83. The overall goal of computer-integrated manufacturing is to create flexible, agile, manufacturing
84. Computer-integrated manufacturing systems support all of the following concepts except:
B. Inquiry processing
____________________.
B. computer-aided manufacturing
60
86. When a manufacturer installs performance-monitoring information systems for factory floor
87. When a manufacturer uses computers to control ongoing physical processes, it is an example of
____________________.
C. process control
88. Machine control is the use of computers to control the actions of machines. This is also known
as ____________________.
A. numerical control
89. Accounting systems are among the ____________________, yet _______________ information
systems in business.
90. According to the text, _______________ emphasize legal and historical record-keeping and the
91. Which of the six essential accounting business systems mentioned in the text reflects changes in
C. Inventory control
61
92. Which of the six essential accounting business systems mentioned in the text records purchases
A. Accounts payable
decisions concerning the financing of a business, and the allocation and control of financial
B. financial management
94. Instead of focusing on the information processing requirements of business functions, enterprise
operations of a business.
processes
95. An enterprise _______________ architecture illustrates the inter-relationships of the major cross-
functional enterprise applications that many companies have, or are installing, today.
application
96. _______________ Systems cross the boundaries of traditional business functions in order to
reengineer and improve vital business processes all across the enterprise.
Cross-functional enterprise
97. _______________ focuses on the efficiency of a firm's internal production, distribution, and
financial processes.
62
98. EAI software can integrate the front-office and ________________ applications of a business so
back-office
100. Transaction processing systems (TPS) are _______________ information systems that process
cross-functional
101. Transaction processing systems process data in two basic ways: batch processing and
_______________ processing.
real-time or online
102. Many online systems depend on the capabilities of _______________ tolerant computer systems
fault
103. Electronic conferencing options include electronic meeting systems and other group support
systems where team members can meet at the same time and place in a _______________ room
setting.
decision
104. The goal of interactive marketing is to enable a company to profitably use networks to attract and
keep or retain
63
105. Advertising and promotion efforts can be tailored to each visit to a site by an individual. This
strategy is based on a variety of tracking techniques, such as Web "__________" files recorded
cookie
106. The production/operations function is concerned with the management of the operational
systems
107. _______________ is an overall concept that stresses that the objectives of computer-based
systems in manufacturing must be to simplify, automate, and integrate all production and support
processes.
108. Manufacturing information systems help companies plan the types of material needed in the
material requirements
109. Manufacturing execution systems monitor, track, and control the five essential components in a
production facilities.
personnel
110. _______________ Control is the use of computers to control an ongoing physical process.
Process
111. Machine control is the use of computers to control the actions of machines. This is also popularly
numerical
64
112. _______________ Information systems are designed to support planning to meet the personnel
needs of the business, development of employees to their full potential, and control all personnel
Human resource
113. Human resource information systems support the strategic, tactical, and _______________ use of
operational
114. Management accounting systems focus on the planning and __________ of business operations.
control
115. The __________ budgeting process involves evaluating the profitability and financial impact of
capital
116. _______________ planning software can help determine the financing needs of a business and
Financial
117. EAI software can integrate _______________ and ________________ applications so they work
118. Syntellect Interactive Services developed _______________ for cable pay-per-view systems.
65