Which of the following sentences is true for the


1. ________ occur(s) when data are isolated in separated information systems.


A. Walled garden
B. Information silos
C. Scheduling
D. System integration

2.Which of the following is true about personal information systems?

A. Personal information systems that support a particular department are sometimes called departmental information systems.
B. Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done.
C. Such systems have only one user and hence procedures need not be documented or formalized in any significant way.
D. The solutions to problems in a personal information system usually involve more than one department.

3. Which of the following is an example of a personal information system?

A. scheduling of groundskeeping
B. contact manager
C. charging of membership fees
D. ordering of restaurant supplies from suppliers

4. A Web store front is an example of a(n) ________.

A. interenterprise information system
B. collaborative information system
C. functional information system
D. departmental information system

5. ________ are information systems that are shared by two or more independent organizations.

A. Interenterprise information systems
B. Workgroup information systems
C. Enterprise information systems
D. Personal information systems

6. Which of the following applications falls under the common departmental information system of sales and marketing?

A. order tracking
B. general ledger
C. lead generation
D. assessment

7. ________ is an application of the human resources department.

A. Compensation
B. Planning
C. Financial reporting
D. Lead tracking

8. Which of the following is a consequence of isolated information systems?

A. Data cannot get duplicated.
B. Business processes are coherent and efficient.
C. Decision are made is union with other systems.
D. There is a lack of integrated enterprise information.

9. ________ is the activity of altering and designing business processes to take advantage of new information systems.

A. Business process management
B. Business process reengineering
C. Business process improvement
D. Business process interoperability

10. Inherent processes are ________.

A. time-consuming business processes and involve substantial investment.
B. predesigned procedures for using the software products
C. result from altering & designing business processes to take advantage of new information systems.
D. preferred by employees due to the ease & structure they bring to functional applications.

11. B2B refers to e-commerce sales between:

A. business and banks
B. business and customers
C. business and government
D. businesses

12. E-commerce businesses dealing with sales between a supplier and a retail consumer are ________.

A. B2C
B. B2B
C. B2G
D. C2C

13. Jackson Enterprises sells online directly to the EPA. Jackson is engaging in ________ e-commerce.

A. B2B
B. B2C
C. B2G
D. B2E

14. To allow online customers to enter and mange their orders, a firm may create a/an.

A. Web storefront
B. B2B
C. merchant company
D. computer transfer

15. Companies that take possession of goods they sell are:

A. e-commerce companies
B. B2B companies
C. merchant companies
D. nonmerchant companies

16. A company that matches buyers and sellers based on price matched transactions is a(n) ________.

A. B2C
B. clearinghouse
C. auction
D. electronic exchange

17. A(n) ________ provides goods and services at a stated price and arrange for delivery of the same, but does not take possession.

A. B2C
B. clearinghouse
C. auction
D. electronic exchange

18. The elimination of the middle layers of the supply chain is called ________.

A. price conflict
B. disintermediation
C. price elasticity
D. channeling

19. When HP Computers began to sell directly to the public, some retailers resented the competition and dropped the HP lines from their stores. This is an example of ________.

A. channel conflict
B. price conflict
C. logistics expense
D. price elasticity

20. Which of the following is NOT one of the three tiers in tiered architecture?

A. User
B. Server
C. Client
D. Database

21. A petabyte of data is equal to ________ gigabytes of data. HINT: Check out the index in your book.

A. 1,000,000
B. 1,000
C. 100
D. 10

22. ________ systems use statistical analysis to process data.

A. KM
B. Expert
C. Reporting
D. Data-mining

23. ________ systems are programs that read data from a variety of sources, process that data, and produce and deliver formatted reports to users.

A. KM
B. Data-mining
C. Expert
D. Reporting

24. ________ computes the correlation of items on past orders to determine items frequently purchased together.

A. Market-basket analysis
B. Knowledge-management systems
C. Expert systems
D. Clickstream data reports

25.If/Then rules are used with:

A. data-mining systems
B. knowledge-management systems
C. expert systems
D. reporting systems

26. Which of the following is NOT an example of dirty data?

A. Missing values
B. Inconsistent data
C. Problematic data
D. Coarseness

27. On a web site, a customer's clickstream data provides a record of ________ on the site.

A. ads viewed
B. everything done
C. hyperlinks clicked
D. queries made

28. A data warehouse also contains a special database that stores the ________, which records its source, history, format, and constraints.

A. dirty data
B. metadata
C. clickstream data
D. operational data

29. Data collections that address a functional area of a business are called ________.

A. data marts
B. data warehouses
C. data mines
D. database systems

30.Regression analysis is used in ________.

A. data-mining systems
B. knowledge-management systems
C. expert systems
D. reporting systems

31.Which of the following is NOT one of the IT department's major responsibilities?

A. Provide all users with the software that they want.
B. Plan for information systems and IT structure.
C. Maintain information systems.
D. Protect data.

32. Which of the following is NOT one of the three principal reasons why employees need to know about the IS department?

A. to be a better informed and effective manager or executive
B. to be an effective consumer of the IT department's resources
C. to ensure that the functions of the IT department are performed
D. to have access to information beyond the immediate requirement of one's job description

33.Which of the following statements is true regarding the IT department's responsibility of planning for information systems (IS) and IT infrastructure?

A. While they assist the organization to achieve its goals, they do not have any particular impact on its competitive advantage.
B. IT infrastructure and systems are independent of the functioning of the other departments.
C. All projects involving IS are a part of a business system or facilitate some business goal.
D. IT infrastructure and systems are known to be particularly adaptive to changing conditions.

34. An organization that can quickly adapt to changes in the market, industry, product, law, or other significant external factors is referred to as a(n) ________.

A. functional enterprise
B. bureaucratic organization
C. network organization
D. agile enterprise

35.After planning for information systems and IT infrastructure, the next step is ________.

A. creating, developing, and adapting both information systems and IT infrastructure
B. operating and managing the information systems and IT infrastructure
C. maintaining information systems and managing IT infrastructure
D. protecting infrastructure and data from threats

36.Which of the following is true about protecting infrastructure and data?

A. The IT department is responsible for protecting infrastructure and data from threats.
B. One of the sources of threats to IT infrastructure is malicious human activity.
C. The responsibility of identifying threats is left to the IS department while managing these threats is the IT department's job.
D. The IS department works with the CTO and others in the organization to determine what safeguards to implement, or stated differently, what level of risk to assume.

37. Other titles for the ________ include director of information services and director of computer services.

A. CTO
B. CFO
C. CEO
D. CIO

38. 8 Which of the following is true for the technology group in most IS departments?

A. The size and structure of the technology group depends on whether programs are developed in-house.
B. The technology group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services.
C. A technology office investigates new information systems technologies and determines how the organization can benefit from them.
D. The technology department manages the computing infrastructure, including individual computers, computer centers, networks, and communications media.

39.Which of the following sentences is true for the development group of an IS department?

A. The development group manages the process of creating new information systems as well as maintaining existing information systems.
B. An important function for the development group is to monitor user experience and respond to user problems.
C. This group exists in organizations that have negotiated outsourcing agreements with other companies to provide equipment, applications, or other services.
D. The purpose of the development group is to protect data and information assets by establishing data standards and data management practices and policies.

40. Which of the following is NOT a responsibility of a systems analyst?

A. developing procedures
B. writing programs
C. determining system requirements
D. designing job descriptions

41. Which of the following is NOT and example of one of the main sources of security threats?

A. Human error.
B. Hacking.
C. Hurricanes.
D. Computer failure.

42. Which of the following is an example of human mistakes?

A. Employees purposely destroying data.
B. Viruses.
C. None of the above.
D. Poorly written programs.

43. A ________ is someone who pretends to be a legitimate company and sends email requesting confidential data.

A. hacker
B. spoofer
C. sniffer
D. phisher

44. _______ is a technique for intercepting computer communications.

A. Sniffing
B. Spoofing
C. Hacking
D. Pretexting

45.Unauthorized data disclosure can occur by ________ when proprietary information is released to the press.

A. phishing
B. human error
C. hacking
D. spoofing

46. In order to intercept communications on ________ networks, drive-by sniffers simply drive or walk around with computers with wireless connections.

A. local area
B. wireless
C. public
D. commercial

47. Some unauthorized programs are able to ________ the legitimate system and substitute their own processing.

A. hack
B. overrun
C. flood
D. usurp

48. The password ________ the user.

A. approves
B. authenticates
C. encrypts
D. identifies

49. Organizations should protect sensitive data by storing it in ________ form.

A. digital
B. standardized
C. authenticated
D. encrypted

50. ________ safeguards involve the people and procedure components of information systems.

A. Human
B. Hacker
C. Technical
D. Account

Request for Solution File

Ask an Expert for Answer!!
Management Information Sys: Which of the following sentences is true for the
Reference No:- TGS02317006

Expected delivery within 24 Hours