Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
IT allows for the increased productivity of manager thus a flatter organizational hierarchy
|
True
|
|
The cost of preventing hazards is low and companies should protect themselves against all possible hazards.
|
True
|
|
__________ is based on a fundamentally different view of computer systems than that found in traditional SDLC development approaches.
|
object-oriented development
|
|
Dehumanization is a frequent criticism of traditional data processing systems.
|
True
|
|
Tax benefits are not benefits to companies that outsource products or services.
|
False
|
|
The purpose for which data will be collected is a principle of __________.
|
protection of individual's privacy
|
|
Long-term systems needs is an element in the ____________
|
IS operational plan
|
|
System design describes what a system must do to solve the business problem
|
False
|
|
The use of the web wireless communication intelligent systems, DSS, and collaborative technologies leads to all of the following organizational changes except __________.
|
increased number of organizational levels
|
|
Most companies do not use the SDLC approach for Internet/intranet development
|
True
|
|
__________ is based on a fundamentally different view of computer systems than that found in traditional SDLC development approaches
|
object-oriented development
|
|
One improvement in the quality of life attributed to IT is the improvement in healthcare
|
True
|
|
The intangible property created by individuals or corporations, which is protected, is called a trade secret
|
False
|
|
Systems that support or shape an organization's competitive strategy are called strategic information systems
|
True
|
|
A growing number of employees work from home or from the road making use of the telecommuting approach
|
True
|
|
Hackers are typically insiders who use viruses as the primary means of penetrating computer systems.
|
False
|
|
Practice Test Ch 13 - 15
User ID: smiller0401 Attempt: 18 / Unlimited Out of: 60 Started: Jul 22, 2003 08:26 Finished: Jul 22, 2003 08:48 Time spent: 22 min. 44 sec. Student finished 1 hr, 37 min., 16 sec. ahead of the 120 min. time limit. Return to Scores. -------------------------------------------------------------------------------- Question 1 (1 point) The vertical dimensions of a company's organizational structure often create problems known as __________ problems. Percent Value Correct Response Student Response Answer Choices 0.0% 1. vertical 0.0% 2. hierarchical 0.0% 3. fireplace 100.0% 4. stovepipe 0.0% 5. horizontal General feedback See page 438 Score 1 / 1 -------------------------------------------------------------------------------- Question 2 (1 point) Which of the following is not a response strategy to Porter's competitive forces model __________? Percent Value Correct Response Student Response Answer Choices 0.0% 1. cost leadership strategy 0.0% 2. innovation strategy 0.0% 3. customer-oriented strategy 0.0% 4. focus strategy 100.0% 5. all of the above are responses General feedback See pages 430-431 Score 1 / 1 -------------------------------------------------------------------------------- Question 3 (1 point) Principles that exist in business process reengineering include all of the following except _________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. empowerment of employees 0.0% 2. steps in the business process are completed in order 100.0% 3. all jobs are separated 0.0% 4. a hybrid centralized/decentralized operation is used 0.0% 5. a single point of contact is provided to customers General feedback See pages 441-442 Score 1 / 1 -------------------------------------------------------------------------------- Question 4 (1 point) All of the following are forces of Porter's competitive forces model except__________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. the bargaining power of suppliers 0.0% 2. the bargaining power of customers 0.0% 3. the treat of substitute products 100.0% 4. no threat of entry of new competitors 0.0% 5. the rivalry among existing firms in the industry General feedback See pages 429-430 Score 1 / 1 -------------------------------------------------------------------------------- Question 5 (1 point) Information technology contributes to strategic systems in all of the following ways except __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. IT creates applications that provide direct strategic advantage 0.0% 2. IT supports strategic changes such as reengineering 0.0% 3. IT provides for technological innovations 0.0% 4. IT provides competitive intelligence 100.0% 5. IT has no legal issues for companies General feedback See page 428 Score 1 / 1 -------------------------------------------------------------------------------- Question 6 (1 point) IT tools that support BPR include all of the following except _________ . Percent Value Correct Response Student Response Answer Choices 0.0% 1. simulation and visual simulation tools 0.0% 2. flow diagrams 0.0% 3. work analysis 0.0% 4. integrated tool kits 100.0% 5. workflow GUI General feedback See pages 442-443 Score 1 / 1 -------------------------------------------------------------------------------- Question 7 (1 point) Many of the largest U.S. corporations are using which type of teams __________? Percent Value Correct Response Student Response Answer Choices 0.0% 1. permanent or workgroup teams 0.0% 2. problem-solving teams 0.0% 3. quality circles 0.0% 4. virtual teams 100.0% 5. all of the above General feedback See page 450 Score 1 / 1 -------------------------------------------------------------------------------- Question 8 (1 point) In the 1970s and 1980s companies were able to sustain a competitive advantage by using __________. Percent Value Correct Response Student Response Answer Choices 100.0% 1. outward systems 0.0% 2. inward systems 0.0% 3. strategic information systems 0.0% 4. strategic alliances 0.0% 5. competitive intelligence General feedback See page 435 Score 1 / 1 -------------------------------------------------------------------------------- Question 9 (1 point) ____________ are when two or more companies share an interorganizational system. Percent Value Correct Response Student Response Answer Choices 0.0% 1. competitive alliances 100.0% 2. strategic alliances 0.0% 3. virtual companies 0.0% 4. strategic information systems 0.0% 5. computer information systems General feedback See page 427 Score 1 / 1 -------------------------------------------------------------------------------- Question 10 (1 point) Several principles and methods that enhanced the development of the Industrial Revolution include all of the following except __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. specialization of labor 0.0% 2. mass production 100.0% 3. decreased cost of labor 0.0% 4. assembly lines 0.0% 5. complex support systems General feedback See page 437 Score 1 / 1 -------------------------------------------------------------------------------- Question 11 (1 point) The use of inward systems are those not visible to competitors and details are kept secret. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 435 Score 0 / 1 -------------------------------------------------------------------------------- Question 12 (1 point) Cycle time reduction enables a company to produce large volumes of products for customers. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 445 Score 1 / 1 -------------------------------------------------------------------------------- Question 13 (1 point) Systems that support or shape an organization's competitive strategy are called strategic information systems. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 426 Score 1 / 1 -------------------------------------------------------------------------------- Question 14 (1 point) One of the most well-known frameworks for analyzing competitiveness is Porter's competitive forces model. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 429 Score 1 / 1 -------------------------------------------------------------------------------- Question 15 (1 point) Activities to gather information on competitors are known as competitive alliances. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 427 Score 1 / 1 -------------------------------------------------------------------------------- Question 16 (1 point) Quality circles are a type of self-directed team found in many of the largest U.S. corporations. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 450 Score 1 / 1 -------------------------------------------------------------------------------- Question 17 (1 point) A virtual company is a single organization that does its entire work via the Internet. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 451 Score 1 / 1 -------------------------------------------------------------------------------- Question 18 (1 point) All organizations contain both horizontal and vertical dimensions of management. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 438 Score 1 / 1 -------------------------------------------------------------------------------- Question 19 (1 point) Business process reengineering is a fundamental change in the manner in which business is conducted. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 436 Score 1 / 1 -------------------------------------------------------------------------------- Question 20 (1 point) Companies have no legal responsibility when using IT to gain a competitive advantage. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See pages 450-451 Score 0 / 1 -------------------------------------------------------------------------------- Question 21 (1 point) The final stage of the SDLC is implementation. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 471 Score 1 / 1 -------------------------------------------------------------------------------- Question 22 (1 point) System design describes what a system must do to solve the business problem. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 467 Score 1 / 1 -------------------------------------------------------------------------------- Question 23 (1 point) The IS strategic plan is the entire set of activities needed to construct an information system solution to a business problem or opportunity. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 461 Score 1 / 1 -------------------------------------------------------------------------------- Question 24 (1 point) The tools used to automate the early stages of the SDLC are called upper CASE tools. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 474 Score 1 / 1 -------------------------------------------------------------------------------- Question 25 (1 point) A problem with end-user development is that managers outside the IS area generally have limited technical skills. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 476 Score 1 / 1 -------------------------------------------------------------------------------- Question 26 (1 point) The IS strategic plan should be, but is not required, to be aligned with the organization's strategic plan. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 462 Score 1 / 1 -------------------------------------------------------------------------------- Question 27 (1 point) Most companies do not use the SDLC approach for Internet/intranet development. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 483 Score 0 / 1 -------------------------------------------------------------------------------- Question 28 (1 point) Improving the programmers' productivity and quality is a major advantage of the object-oriented approach to software development. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 475 Score 1 / 1 -------------------------------------------------------------------------------- Question 29 (1 point) The SDLC is based on the waterfall approach but today, system developers are able to go back and forth between stages as needed. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 463 Score 1 / 1 -------------------------------------------------------------------------------- Question 30 (1 point) Tax benefits are not benefits to companies that outsource products or services. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 479 Score 1 / 1 -------------------------------------------------------------------------------- Question 31 (1 point) The stage of the SDLC that describes how the system will accomplish a task is the __________ stage. Percent Value Correct Response Student Response Answer Choices 100.0% 1. system design 0.0% 2. system analysis 0.0% 3. implementation 0.0% 4. programming 0.0% 5. testing General feedback See page 468 Score 1 / 1 -------------------------------------------------------------------------------- Question 32 (1 point) All of the following are problems created for companies involved in outsourcing except __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. internal cost reduction opportunities 0.0% 2. contract problems 0.0% 3. lack of business expertise 0.0% 4. staffing 100.0% 5. specialization General feedback See page 479 Score 1 / 1 -------------------------------------------------------------------------------- Question 33 (1 point) Long-term systems needs is an element in the ____________ . Percent Value Correct Response Student Response Answer Choices 0.0% 1. SDLC 100.0% 2. IS operational plan 0.0% 3. IS strategic plan 0.0% 4. IS mission 0.0% 5. IS vision General feedback See page 463 Score 0 / 1 -------------------------------------------------------------------------------- Question 34 (1 point) The traditional systems development method used by most organizations today is called the __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. HTML 0.0% 2. TCP/IP 0.0% 3. RAD 0.0% 4. CASE 100.0% 5. SDLC General feedback See page 463 Score 1 / 1 -------------------------------------------------------------------------------- Question 35 (1 point) __________ is based on a fundamentally different view of computer systems than that found in traditional SDLC development approaches. Percent Value Correct Response Student Response Answer Choices 0.0% 1. CASE 0.0% 2. RAD 100.0% 3. object-oriented development 0.0% 4. end-user development 0.0% 5. external acquisition General feedback See pages 474-475 Score 0 / 1 -------------------------------------------------------------------------------- Question 36 (1 point) A typical RAD package includes all of the following except __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. graphical user development environment 100.0% 2. code corrector 0.0% 3. code generator 0.0% 4. programming language 0.0% 5. reusable components General feedback See page 473 Score 1 / 1 -------------------------------------------------------------------------------- Question 37 (1 point) Information systems professionals who specialize in analyzing and designing information systems are called __________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. programmers 100.0% 2. system analysts 0.0% 3. managers 0.0% 4. technical specialists 0.0% 5. system stakeholders General feedback See pages 467 Score 1 / 1 -------------------------------------------------------------------------------- Question 38 (1 point) The fundamental element in the OOA&D is the _________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. analysis 0.0% 2. design 0.0% 3. software 100.0% 4. object 0.0% 5. none of the above General feedback See page 475 Score 1 / 1 -------------------------------------------------------------------------------- Question 39 (1 point) _________ gives users control over both the initial development of an application and the ongoing maintenance. Percent Value Correct Response Student Response Answer Choices 100.0% 1. End-user development 0.0% 2. OOA&D 0.0% 3. RAD 0.0% 4. CASE 0.0% 5. External General feedback See page 18 Score 1 / 1 -------------------------------------------------------------------------------- Question 40 (1 point) The __________ approach is when system developers first obtain only a general idea of user requirements. Percent Value Correct Response Student Response Answer Choices 0.0% 1. SDLC 0.0% 2. JAD 0.0% 3. CASE 100.0% 4. prototyping 0.0% 5. object-oriented General feedback See page 472 Score 1 / 1 -------------------------------------------------------------------------------- Question 41 (1 point) One improvement in the quality of life attributed to IT is the improvement in healthcare. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 503 Score 1 / 1 -------------------------------------------------------------------------------- Question 42 (1 point) A growing number of employees work from home or from the road making use of the telecommuting approach. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 507 Score 1 / 1 -------------------------------------------------------------------------------- Question 43 (1 point) The right of privacy is absolute and should not be balanced against the needs of society. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 491 Score 1 / 1 -------------------------------------------------------------------------------- Question 44 (1 point) The branch of philosophy that deals with what is considered to be right and wrong is ethics. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 491 Score 1 / 1 -------------------------------------------------------------------------------- Question 45 (1 point) Hackers are typically insiders who use viruses as the primary means of penetrating computer systems. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See pages 510-511 Score 1 / 1 -------------------------------------------------------------------------------- Question 46 (1 point) A painful repetitive use strain injury that affects the wrists and hands is carpal tunnel syndrome. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 500 Score 1 / 1 -------------------------------------------------------------------------------- Question 47 (1 point) IT allows for the increased productivity of manager thus a flatter organizational hierarchy. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 497 Score 1 / 1 -------------------------------------------------------------------------------- Question 48 (1 point) Dehumanization is a frequent criticism of traditional data processing systems. Percent Value Correct Response Student Response Answer Choices 100.0% 1. True 0.0% 2. False General feedback See page 499 Score 1 / 1 -------------------------------------------------------------------------------- Question 49 (1 point) The intangible property created by individuals or corporations, which is protected, is called a trade secret. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 495 Score 1 / 1 -------------------------------------------------------------------------------- Question 50 (1 point) The cost of preventing hazards is low and companies should protect themselves against all possible hazards. Percent Value Correct Response Student Response Answer Choices 0.0% 1. True 100.0% 2. False General feedback See page 512 Score 0 / 1 -------------------------------------------------------------------------------- Question 51 (1 point) The most publicized method of attack is _________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. programming fraud 100.0% 2. viruses 0.0% 3. data tampering 0.0% 4. denial of service 0.0% 5. hacking General feedback See page 511 Score 1 / 1 -------------------------------------------------------------------------------- Question 52 (1 point) Job stress and anxiety is a __________. Percent Value Correct Response Student Response Answer Choices 100.0% 1. potential job hazard 0.0% 2. ethical issue 0.0% 3. human resource issue 0.0% 4. not a problem with IT 0.0% 5. legal issue General feedback See page 500 Score 1 / 1 -------------------------------------------------------------------------------- Question 53 (1 point) Disadvantages for employees who telecommute include all of the following except _________. Percent Value Correct Response Student Response Answer Choices 0.0% 1. no workplace visibility 0.0% 2. loss of socialization 100.0% 3. increased socialization 0.0% 4. feelings of isolation 0.0% 5. possible lower pay General feedback See page 507 Score 0 / 1 -------------------------------------------------------------------------------- Question 54 (1 point) Which of the following are major types of defense strategies used to protect computer systems __________? Percent Value Correct Response Student Response Answer Choices 0.0% 1. detection 0.0% 2. damage control 0.0% 3. recovery 0.0% 4. correction 100.0% 5. all of the above General feedback See pages 512-513 Score 1 / 1 -------------------------------------------------------------------------------- Question 55 (1 point) Ethical issues related to IT include all of the following except ____________. |
accessibility issues
|
|
The use of inward systems are those not visible to competitors and details are kept secret
|
True
|
|
The branch of philosophy that deals with what is considered to be right and wrong is ethics
|
True
|
|
A painful repetitive use strain injury that affects the wrists and hands is carpal tunnel syndrome.
|
True
|
|
The right of privacy is absolute and should not be balanced against the needs of society.
|
False
|
|
Disadvantages for employees who telecommute include all of the following except _________.
|
increased socialization
|