Uploaded by wigaga3107

downstudocu.com chapter-03-include-mcq-and-questions-merged

advertisement
Management Information Systems: Managing the Digital Firm, 16e (Laudon)
Chapter 3 Information Systems, Organizations, and Strategy
1) The interaction between information technology and organizations is influenced:
A) solely by the decision making of middle and senior managers.
B) by the development of new information technologies.
C) by many factors, including structure, politics, culture, and environment.
D) by two main macroeconomic forces: capital and labor.
E) by the rate of growth of the organization.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
2) Which of the following statements about organizations is not true?
A) An organization is a stable, formal social structure that takes resources from the environment
and processes them to produce outputs.
B) An organization is a formal, legal entity with internal rules and procedures that must abide by
laws.
C) An organization is a collection of people and other social elements.
D) An informal group can be considered to be an organization.
E) An organization is a collection of rights, privileges, obligations, and responsibilities delicately
balanced over a period of time through conflict and conflict resolution.
Answer: D
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
3) According to the ________ definition of organizations, an organization is seen as a means by
which capital and labor are transformed by the organization into outputs to the environment.
A) microeconomic
B) macroeconomic
C) sociotechnical
D) behavioral
E) psychological
Answer: A
Difficulty: Challenging
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
1
Copyright © 2020 Pearson Education, Inc.
4) Which of the following statements about the technical view of organizations is not true?
A) It focuses on how inputs are combined to create outputs when technology changes are
introduced into a company.
B) It sees capital and labor as being easily substituted for one another.
C) It emphasizes group relationships, values and structures.
D) It sees the organization as a social structure similar to a machine.
E) It sees the firm as being infinitely malleable.
Answer: C
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
5) Which of the following is not a major feature of organizations that impacts the use of
information systems?
A) Business processes
B) Environments
C) Structure of the organization
D) Agency costs
E) Leadership styles
Answer: D
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
6) Which of the following statements about business processes is not true?
A) Business processes influence the relationship between an organization and information
technology.
B) Business processes are a collection of standard operating procedures.
C) A business firm is a collection of business processes.
D) Business processes are usually ensconced in an organization's culture.
E) Business processes are typically unaffected by changes in information systems.
Answer: E
Difficulty: Challenging
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
2
Copyright © 2020 Pearson Education, Inc.
7) Which of the following technologies disrupted the traditional publishing industry?
A) Instant messaging
B) e-mail
C) Digital photography
D) PCs
E) World Wide Web
Answer: E
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
8) Under Mintzberg's classification of organizational structure, knowledge-based organizations
fall under the category of:
A) entrepreneurial structures.
B) divisionalized bureaucracies.
C) professional bureaucracies.
D) adhocracies.
E) machine bureaucracies.
Answer: C
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
9) Mintzberg classifies a large bureaucracy existing in a slowly changing environment that
produces standard products and is dominated by centralized management as a(n) ________
bureaucracy.
A) machine
B) professional
C) divisionalized
D) multidivisional
E) ad hoc
Answer: A
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
3
Copyright © 2020 Pearson Education, Inc.
10) Which of the following is an example of a divisionalized bureaucracy?
A) Startup firm
B) University
C) Fortune 500 firm
D) Midsize manufacturer
E) Consulting firm
Answer: C
Difficulty: Challenging
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
11) Along with capital, ________ is the primary production input that the organization uses to
create products and services.
A) structure
B) culture
C) politics
D) feedback
E) labor
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
12) The divergent viewpoints about how resources, rewards, and punishments should be
distributed, and the struggles resulting from these differences are known as organizational:
A) culture.
B) politics.
C) structure.
D) environments.
E) business processes.
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
4
Copyright © 2020 Pearson Education, Inc.
13) Which of the following statements about disruptive technologies is not true?
A) Disruptive technologies radically change the business landscape and environment.
B) Disruptive technologies may be substitute products that perform better than other products
currently being produced.
C) Disruptive technologies may sometimes simply extend the marketplace.
D) Disruptive technologies may put entire industries out of business.
E) Firms that invent disruptive technologies as first movers always become market leaders.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
14) As discussed in the chapter opening case, which of the following statements about Starbucks
is not true?
A) Starbucks strives to offer customers high-quality coffee, friendly servers, and customer
friendly stores.
B) Starbucks plans to increase its online sales of coffee products using new technology.
C) Starbucks plans to use IT innovations to enhance the customer experience.
D) Starbucks is trying to create a unique customer experiences in stores.
E) Starbucks is planning to sell coffee, branded mugs, and espresso machines on its website.
Answer: E
Difficulty: Challenging
AACSB: Application of knowledge
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
15) All organizations have bedrock, unquestioned assumptions that define their goals and
products.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
16) A machine bureaucracy is a knowledge-based organization where goods and services depend
on the expertise and knowledge of professionals.
Answer: FALSE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
5
Copyright © 2020 Pearson Education, Inc.
17) Routines are also called standard operating procedures.
Answer: TRUE
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
18) How are the technical and behavioral definitions of an organization different?
Answer: The behavioral definition of an organization is that it is a collection of rights,
privileges, obligations, and responsibilities that is delicately balanced over a period of time
through conflict and conflict resolution. The technical definition sees an organization as an entity
that takes inputs from the environment and processes these to create products that are then
consumed by the environment. The technical view sees capital and labor as interchangeable
units, with the ability to rearrange these units at will, whereas the behavioral view sees that
rearranging some aspects of the organization, such as an information system, will have important
consequences and changes for the organization's other units.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-1: Which features of organizations do managers need to know about to build and use
information systems successfully?
19) When a firm buys on the marketplace what it cannot make itself, the costs incurred are
referred to as:
A) switching costs.
B) network costs.
C) procurement.
D) agency costs.
E) transaction costs.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 3-2: What is the impact of information systems on organizations?
20) All of the following statements are true about information technology's impact on business
firms except:
A) it helps firms expand in size.
B) it helps firms lower the cost of market participation.
C) it helps reduce internal management costs.
D) it helps reduce transaction costs.
E) it helps reduce agency costs.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 3-2: What is the impact of information systems on organizations?
6
Copyright © 2020 Pearson Education, Inc.
21) According to agency theory, the firm is viewed as a(n):
A) unified, profit-maximizing entity.
B) task force organization that must respond to rapidly changing environments.
C) entrepreneurial endeavor.
D) "nexus of contracts" among self-interested individuals.
E) entrepreneurial structure.
Answer: D
Difficulty: Challenging
AACSB: Reflective thinking
LO: 3-2: What is the impact of information systems on organizations?
22) According to research on organizational resistance, the four components that must be
changed in an organization in order to successfully implement a new information system are:
A) environment, organization, structure, and tasks.
B) technology, people, culture, and structure.
C) organization, culture, management, and environment.
D) tasks, technology, people, and structure.
E) costs, tasks, structure, and management.
Answer: D
Difficulty: Challenging
AACSB: Information technology
LO: 3-2: What is the impact of information systems on organizations?
23) List three organizational factors that can prevent a firm in fully realizing the benefits of a
new information system, and provide examples for each.
Answer: Features of organizations include the organization's culture, politics, and structure. A
new information system might be resisted by end users or by managers for political reasons
because they are concerned about the political changes the system implies. For example, a new
system might lessen the authority of a manager in overseeing the employees, and he or she may
not want to relinquish this power. A new information system might challenge the organization's
culture and be resisted for this reason. For example, an information system might allow students
at a university to take self-managed courses, while the university's basic cultural assumptions
include the concept that professors are the purveyors of knowledge. An information system, by
allowing the distribution of knowledge, may be better used in a company with a flatter
organization. A company with a highly stratified hierarchy may have difficulty adjusting its
business processes and structures to an information system that does not follow the same
business hierarchy of information.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-2: What is the impact of information systems on organizations?
7
Copyright © 2020 Pearson Education, Inc.
24) What is agency theory? How does information technology enable a firm to reduce agency
costs?
Answer: According to agency theory, the firm is viewed as a "nexus of contracts" among selfinterested individuals rather than as a unified, profit-maximizing entity. A principal (owner)
employs "agents" (employees) to perform work on his or her behalf. However, agents need
constant supervision and management; otherwise, they will tend to pursue their own interests
rather than those of the owners. As firms grow in size and scope, agency costs or coordination
costs rise because owners must expend more and more effort supervising and managing
employees. Information technology, by reducing the costs of acquiring and analyzing
information, permits organizations to reduce agency costs because it becomes easier for
managers to oversee a greater number of employees. By reducing overall management costs,
information technology enables firms to increase revenues while shrinking the number of middle
managers and clerical workers.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 3-2: What is the impact of information systems on organizations?
25) Which model is used to describe the interaction of external forces that affect an
organization's strategy and ability to compete?
A) Network economics model
B) Competitive forces model
C) Competitive advantage model
D) Demand control model
E) Agency costs model
Answer: B
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
26) Which of the following industries has the lowest barrier to entry?
A) Automotive
B) Computer chip
C) Solar energy
D) Airline
E) Small retailer
Answer: E
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
8
Copyright © 2020 Pearson Education, Inc.
27) All of the following are competitive forces in Porter's model except:
A) suppliers.
B) new market entrants.
C) disruptive technologies.
D) customers.
E) substitute products.
Answer: C
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
28) Which of the following marketplace forces would be of least concern to a manufacturer of
deep-sea oil rigs?
A) Product differentiation
B) Traditional competitors
C) Low number of suppliers
D) New market entrants
E) Low number of customers
Answer: D
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
29) Which of the following substitute products would be of most concern for a cable TV
distributor?
A) Streaming music services
B) Broadcast TV
C) Satellite radio
D) On-demand Internet television
E) Terrestrial radio
Answer: D
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
9
Copyright © 2020 Pearson Education, Inc.
30) Walmart's continuous replenishment system is an example of a firm using information
systems to:
A) strengthen ties to its customers.
B) simplify the industry value chain.
C) develop synergies.
D) focus on market niche.
E) achieve low-cost leadership.
Answer: E
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
31) A firm can exercise greater control over its suppliers by having:
A) more suppliers.
B) fewer suppliers.
C) global suppliers.
D) local suppliers.
E) only a single supplier.
Answer: A
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
32) Amazon's use of the Internet as a platform to sell books more efficiently than traditional
bookstores illustrates which of the following strategies?
A) Low-cost leadership
B) Marketing effectiveness
C) Focusing on market niche
D) Strengthening supplier intimacy
E) Developing synergies
Answer: A
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
10
Copyright © 2020 Pearson Education, Inc.
33) The four major competitive strategies are:
A) low-cost leadership, substitute products and services, customers; and suppliers.
B) low-cost leadership, product differentiation, focus on market niche, and customer and supplier
intimacy.
C) new market entrants, substitute products and services, customers, and suppliers.
D) low-cost leadership, new market entrants, product differentiation, and focus on market niche.
E) customers, suppliers, new market entrants, and substitute products.
Answer: B
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
34) Walmart's continuous replenishment system allows it to do all of the following except:
A) provide mass customization.
B) transmit orders to restock directly to its suppliers.
C) keep costs low.
D) better meet customer demands.
E) fine-tune merchandise availability.
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
35) Firms use a ________ strategy to provide a specialized product or service for a narrow target
market better than competitors.
A) product differentiation
B) market niche
C) mass customization
D) process efficiency
E) low-cost leadership
Answer: B
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
11
Copyright © 2020 Pearson Education, Inc.
36) The ability to offer individually tailored products or services using the same production
resources as bulk production is known as:
A) mass marketing.
B) micromarketing.
C) micro customization.
D) niche customization.
E) mass customization.
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
37) In environmental scanning, a firm may use information systems to:
A) transform inputs into products and services.
B) analyze the performance of its intranet.
C) identify external events that may affect it.
D) keep track of the temperature within its data centers.
E) develop a unified organizational culture.
Answer: C
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
38) Which of the following is not a true statement about value webs?
A) Value webs involve a collection of independent firms that use information technology to
coordinate their value chains.
B) Value webs are more customer-driven than traditional value chains.
C) Value webs operate in a less linear fashion than traditional value chains.
D) Value webs are inflexible and cannot adapt quickly to changes in supply and demand.
E) Value webs involve highly synchronized industry value chains.
Answer: D
Difficulty: Challenging
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
12
Copyright © 2020 Pearson Education, Inc.
39) Which of the following best illustrates the use of information systems to focus on market
niche?
A) A car manufacturer's website that lets you customize the features on the car you are
purchasing.
B) A restaurant chain analyzing local sales figures to determine which menu items to serve.
C) A bookseller selling an e-book reader that reads only the bookseller's books.
D) A department store creating specialized products for preferred customers.
E) A clothes manufacturer expanding its offerings to new styles.
Answer: D
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
40) All of the following are IT-enabled products and services providing competitive advantage
except:
A) Amazon's one-click shopping.
B) Apple's iTunes.
C) Ping's golf club customization.
D) PayPal's online person-to-person payment system.
E) Nike's use of celebrities to market their products.
Answer: E
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
41) The Internet increases the bargaining power of customers by:
A) creating new opportunities for building loyal customer bases.
B) making more products available.
C) making information available to everyone.
D) lowering transaction costs.
E) enabling the development of new services.
Answer: C
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
13
Copyright © 2020 Pearson Education, Inc.
42) Hilton Hotels uses its OnQ system for which of the following purposes?
A) To lower its operating costs
B) To benchmark its progress against competitors
C) To create synergies with its suppliers
D) To take advantage of network economics
E) To estimate each guest's profitability and give additional privileges to profitable customers
Answer: E
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
43) Which of the following is a competitive force challenging the publishing industry?
A) Positioning and rivalry among competitors
B) Low cost of entry
C) Substitute products or services
D) Customers' bargaining power
E) Suppliers' bargaining power
Answer: C
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
44) The value chain model:
A) categorizes five related advantages for adding value to a firm's products or services.
B) sees the supply chain as the primary activity for adding value.
C) categorizes four basic strategies a firm can use to enhance its value chain.
D) highlights specific activities in the business where competitive strategies can best be applied.
E) enables more effective product differentiation.
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
14
Copyright © 2020 Pearson Education, Inc.
45) Which of the following represent the primary activities of a firm?
A) Inbound logistics, operations, outbound logistics, sales and marketing, and service
B) Inbound logistics, operations, outbound logistics, technology, and service
C) Procurement, inbound logistics, operations, technology, and outbound logistics
D) Procurement, operations, technology, sales and marketing, and services
E) Organization infrastructure, human resources, technology, and procurement
Answer: A
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
46) Which of the following is a support activity in a firm's value chain?
A) Inbound logistics
B) Operations
C) Sales and marketing
D) Service
E) Technology
Answer: E
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
47) Which of the following would a company employ to measure and compare its business
processes to similar processes of other companies within their industry?
A) Benchmarking
B) Best practices
C) Value chain analysis
D) Strategic systems analysis
E) Secondary activities
Answer: A
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
15
Copyright © 2020 Pearson Education, Inc.
48) The most successful solutions or methods for achieving a business objective are called:
A) value activities.
B) best processes.
C) core competencies.
D) best practices.
E) benchmarks.
Answer: D
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
49) Information systems can be used at the industry level to achieve strategic advantage by:
A) building industrywide, IT-supported consortia and symposia.
B) raising the bargaining power of suppliers.
C) encouraging the entry of new competitors.
D) enforcing standards that reduce the differences between competitors.
E) decreasing switching costs.
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
50) In network economics, the value of a commercial software vendor's software products:
A) increases as more people use them.
B) decreases as more people use them.
C) increases due to higher marginal gain in output.
D) decreases according to the law of diminishing returns.
E) is unrelated to the number of people that use them.
Answer: A
Difficulty: Moderate
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
16
Copyright © 2020 Pearson Education, Inc.
51) When two organizations pool markets and expertise that result in lower costs and generate
profits, they are creating:
A) a value web.
B) a value chain.
C) net marketplaces.
D) core competencies.
E) synergies.
Answer: E
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
52) Which of the following is an example of synergy in business?
A) Amazon's use of the Internet to sell books
B) Bank of America acquiring Countrywide Financial Corporation to reach a large pool of new
customers
C) Blockbuster combining traditional video rental with online video rental
D) Walmart's order entry and inventory management system to coordinate with suppliers
E) Nike's use of technology to improve its product offerings
Answer: B
Difficulty: Easy
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
53) Information systems enhance core competencies by:
A) providing better reporting facilities.
B) creating educational opportunities for management.
C) allowing operational employees to interact with management.
D) encouraging the sharing of knowledge across business units.
E) fostering synergies among departments.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
17
Copyright © 2020 Pearson Education, Inc.
54) The idea that the more any given resource is applied to production, the lower the marginal
gain in output, until a point is reached where the additional inputs produce no additional value, is
referred to as:
A) the point of no return.
B) the law of diminishing returns.
C) supply and demand.
D) network inelasticity.
E) virtual economics.
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
55) Which of the following statements about network economics is not true?
A) Uber is an example of a business model that is based on the principle of network economics.
B) The law of diminishing returns does not always apply to every situation.
C) From a network economics perspective, the value of a community of people grows as the
number of participants in the community increases.
D) Information technology can be strategically useful from a network economics perspective.
E) In network economics, the marginal cost of adding new members to the network is higher
than the marginal gain.
Answer: E
Difficulty: Challenging
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
56) A virtual company:
A) uses networks to link people, assets, and ideas.
B) uses Internet technology to maintain a virtual storefront.
C) uses Internet technology to maintain a networked community of users.
D) provides entirely Internet-driven services or virtual products.
E) is limited by traditional organizational boundaries.
Answer: A
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
18
Copyright © 2020 Pearson Education, Inc.
57) Which of the following is an example of a keystone firm within a business ecosystem?
A) Apple and the mobile platform ecosystem
B) GUESS and the fashion ecosystem
C) Citibank and the ATM ecosystem
D) American Airlines and the computerized reservation ecosystem
E) Nike and the athletic apparel ecosystem
Answer: A
Difficulty: Easy
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
58) ________ is a competitive strategy for creating brand loyalty by developing new and unique
products and services that are not easily duplicated by competitors.
A) Product differentiation
B) Low-cost leadership
C) Focusing on market niche
D) Strengthening customer intimacy
E) Strengthening supplier intimacy
Answer: A
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
59) The expenses incurred by a customer or company in lost time and resources when changing
from one supplier or system to a competing supplier or system are known as:
A) retention costs.
B) preservation costs.
C) differentiation costs.
D) switching costs.
E) variation costs.
Answer: D
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
19
Copyright © 2020 Pearson Education, Inc.
60) The ________ model highlights the primary or support activities that add a margin of value
to a firm's products or services where information systems can best be applied to achieve a
competitive advantage.
A) competitive forces
B) value chain
C) bargaining power
D) new entrant
E) rivalry
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
61) The parts of an organization's infrastructure, human resources, technology, and procurement
that make the delivery of the firm's products or services possible are known as ________
activities.
A) primary
B) auxiliary
C) secondary
D) service
E) support
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
62) A(n) ________ is a collection of independent firms that use information technology to
coordinate their value chains to collectively produce a product or service for a market.
A) value chain
B) support web
C) value web
D) consortium
E) net marketplace
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
20
Copyright © 2020 Pearson Education, Inc.
63) A(n) ________ is an activity for which a firm is a world-class leader.
A) expertise area
B) competitive advantage
C) growth driver
D) efficiency
E) core competency
Answer: E
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
64) Why does Amazon need to worry about competitors in online shopping?
A) E-commerce is affected by the law of diminishing returns.
B) Internet technologies are universal, and therefore usable by all companies.
C) Internet shopping produces cost transparency.
D) The Internet enables the production or sales of substitute products or services.
E) The Internet increases switching costs.
Answer: B
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
65) Smart products are an example of the Internet of Things.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
66) A company's competitive advantages ultimately translate into higher stock market valuations
than its competitors.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
21
Copyright © 2020 Pearson Education, Inc.
67) The competitive forces model cannot be used to analyze modern digital firms which face
new competitive forces that are not true of traditional firms.
Answer: FALSE
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
68) Customers are one of the competitive forces that affect an organization's ability to compete.
Answer: TRUE
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
69) High product differentiation is a sign of a transparent marketplace.
Answer: FALSE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
70) The effect of the Internet has been to increase the bargaining power of customers.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
71) An efficient customer response system directly links consumer behavior to distribution,
production, and supply chains.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
22
Copyright © 2020 Pearson Education, Inc.
72) Information systems are used to enable new products and services via product differentiation.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
73) Mass customization offers individually tailored products or services using the same resources
as mass production.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
74) Switching costs increase when customers are strongly linked to products and platforms.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
75) The value chain model classifies all company activities as either primary or support
activities.
Answer: TRUE
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
76) In the value chain model, support activities are most directly related to the production and
distribution of the firm's products and services, which create value for the customer.
Answer: FALSE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
23
Copyright © 2020 Pearson Education, Inc.
77) When the output of some units in a firm can be used as inputs to other units, synergies
develop, which can lower costs and generate profits.
Answer: TRUE
Difficulty: Easy
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
78) According to the network economics perspective, the more people offering products on
eBay's site, the greater the value of the site to all who use it.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
79) The term business ecosystem describes the loosely coupled but interdependent networks of
suppliers, distributors, outsourcing firms, transportation service firms, and technology
manufacturers.
Answer: TRUE
Difficulty: Moderate
AACSB: Reflective thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
80) A firm can be said to have competitive advantage when it has access to resources that others
do not.
Answer: TRUE
Difficulty: Easy
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
81) The law of diminishing returns only applies to digital products.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
24
Copyright © 2020 Pearson Education, Inc.
82) The inventors of a disruptive technology typically benefit the most from the technology; it is
rare that fast followers catch up quickly.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
83) Smart products generally lower switching costs.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
84) Mintzberg's classification identifies five forces in an industry's environment that affect the
strategic position of a firm.
Answer: FALSE
Difficulty: Easy
AACSB: Application of knowledge
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
25
Copyright © 2020 Pearson Education, Inc.
85) You are advising the owner of ABC Computers, a small local computer shop that repairs and
also builds custom computers to order. What competitive strategies could ABC Computers
employ? Which ones may it have difficulty executing?
Answer: Low-cost leadership: ABC Computers may have difficulty competing against the
computer sales and warranty services of major national computer manufacturers, such as Dell,
but may be able to implement low-cost leadership in comparison to any other local computer
stores.
Product differentiation: Although many national computer manufacturers sell customized
computers for individuals, ABC Computers may be able to differentiate its product by using
superior components and adding more services to its product.
Focus on market niche: ABC Computers could focus on being a local store with in-store
technology support and assistance as a market niche.
Customer and supplier intimacy: ABC Computers has an advantage in customer intimacy, in that
it can develop relationships with local customers on a face-to-face basis. This advantage could be
augmented to offset the low-cost leadership of national manufacturers, such as Dell. Because of
much smaller production scales, ABC Computers will probably not be able to exercise as much
control over suppliers as does Dell or other manufacturers.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
86) You are consulting with the owner of Better Fitness, a national chain of gyms. What
strategies might Better Fitness use in applying information services to achieve a competitive
advantage?
Answer: Better Fitness could use computers, smart products, and mobile apps to monitor and
evaluate health and fitness of members and customize workouts in product differentiation
strategy. They could use information systems for sales and marketing data research in order to
define a niche market that would bring greater profits. They could allow customers to review
their health data and add additional information or view statistics to create customer intimacy. If
the individual gyms are franchises, then a network could be used for franchisees to share data
and research new sales tactics, etc.
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
26
Copyright © 2020 Pearson Education, Inc.
87) The text describes Michael Porter's view of the Internet as somewhat negative. What
negative influences does Porter see? Describe several positive influences the Internet has on
business. Do these outweigh the negative influences?
Answer: Answers will vary. An example of a possible answer is:
Porter sees the Internet as creating ever more intense rivalry, through allowing new competitors
to enter the market, and forcing competition on price alone, raising the bargaining power of
customers, and dampening profits.
Positive influences of the Internet would be lowering telecommunications costs, creating new
opportunities for building brands and loyal customer bases, lowering costs of globalization. You
could also view Porter's negative take on lowering the barrier to entry as a positive for new
companies.
The Internet's influence being negative or positive depends in part on the point of view from
which the influence is being seen. For example, a telephone utility is impacted negatively by the
emergence of Internet telephony, whereas other industries may be impacted positively either
through the use of this technology or through engaging in Internet telephony as a business.
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
88) Value chain analysis is useful at the business level to highlight specific activities in the
business where information systems are most likely to have a strategic impact. Discuss this
model, identify the activities, and describe how the model can be applied to the concept of
information technology.
Answer: The value chain model identifies specific, critical leverage points where a firm can use
information technology most effectively to enhance its competitive positions. Exactly where can
it obtain the greatest benefit from strategic information systems? What specific activities can be
used to create new products and services, enhance market penetration, lock in customers and
suppliers, and lower operational costs? This model views the firm as a series or chain of basic
activities that add a margin of value to a firm's products or services. These activities can be
categorized as either primary activities or support activities.
• Primary activities are most directly related to the production and distribution of the firm's
products and services that create value for the customer. Primary activities include: inbound
logistics, operations, outbound logistics, sales and marketing, and service.
• Support activities make the delivery of the primary activities possible and consist of:
organization infrastructure (administration and management), human resources (employee
recruiting, hiring, and training), technology (improving products and the production process),
and procurement (purchasing input).
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
27
Copyright © 2020 Pearson Education, Inc.
89) How is the concept of core competency relevant to ABC Computers, a local computer store
that repairs and builds custom computers? Give examples.
Answer: A core competency is an activity for which a company is a world leader, and from this
perspective, ABC Computers does not have a core competency, as there are thousands of similar
firms with longer track records. However, it might be good business practice for ABC Computers
to define its core competencies in ways that differentiate its products from those of competitors
and enable it to provide superior service or products. In defining a core competency, the business
management can then determine ways to enable employees to understand and reach higher levels
of quality production and service. For example, ABC Computers might define a core competency
as being able to advise customers as to the types of system they really need, and ABC Computers
could engage in knowledge gathering activities to help employees assess customer need.
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
90) How is Internet technology useful from a network economics perspective? Give examples.
Answer: In network economics, the cost of adding a participant in the network is negligible,
while the gain in value is relatively much larger. The Internet itself is an example of a successful
implementation of network economics–the more people participate, the more valuable and
essential a commodity it is. If a company were to provide a service through the Internet such as a
project management application, the costs to the company of adding another user are small (as
the software infrastructure or application is already built), and the more users are signed up, the
more profit is made.
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
28
Copyright © 2020 Pearson Education, Inc.
91) Define and describe a business ecosystem. Give an example of a business ecosystem.
Answer: A business ecosystem is a collection of loosely coupled but interdependent industries
(suppliers, distributors, technology manufacturers, etc.) that provides related services and
products. It is similar to a value web, except that cooperation takes place across many industries
rather than many firms.
Business ecosystems can be characterized as having one or a few keystone firms that dominate
the ecosystem and create the platforms used by other niche firms. Keystone firms in the
Microsoft ecosystem include Microsoft and technology producers such as Intel and IBM. Niche
firms include thousands of software application firms, software developers, service firms,
networking firms, and consulting firms that both support and rely on the Microsoft products.
Another example of a business ecosystem is the mobile Internet platform. In this ecosystem there
are four industries: device makers (Apple iPhone, Samsung, Motorola, LG, and others), wireless
telecommunication firms (AT&T, Verizon, T-Mobile, Sprint, and others), independent software
applications providers (generally small firms selling games, applications, and ring tones), and
Internet service providers (who participate as providers of Internet service to the mobile
platform).
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
92) Select a popular product or company that you are familiar with, such as Apple's iPad. Apply
Porter's competitive forces model to that product and/or company. Which of the four generic
strategies is the company using?
Answer: Student answers will vary. One example answer using Apple's iPad is:
• Competitors to the iPad include the Microsoft Surface and many others, but few as widely
known.
• New market entrants: There is not a huge barrier to entry in this field; many other technology
companies offer tablet computers.
• Substitute products and services: Smartphones are a substitute product or service.
• Customers: The iPad still has the highest brand recognition among consumers, diminishing
the bargaining power of customers. However, this advantage has diminished as other similar
products that are as well designed enter the marketplace.
In terms of the iPad, Apple seems to be focused on product differentiation by creating a product
with unique features and capabilities.
Difficulty: Challenging
AACSB: Analytical thinking; Written and oral communication
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
29
Copyright © 2020 Pearson Education, Inc.
93) Why are disruptive technologies "tricky"? Provide examples.
Answer: Disruptive technologies can be tricky because firms that invent disruptive technologies
as first movers do not always benefit if they lack the resources to exploit the technology or fail to
see the opportunity. For example, the MITS Altair 8800 is widely regarded as the first PC, but its
inventors did not take advantage of their first-mover status. Second movers, so-called fast
followers such as IBM and Microsoft, reaped the rewards. Citibank's ATMs revolutionized retail
banking, but other banks copied them. Now all banks use ATMs, and the benefits go mostly to
the consumers.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
94) Why has the Internet made competitive rivalry more intense?
Answer: The Internet has made competitive rivalry more intense because Internet technology is
based on universal standards that any company can use, making it easier for rivals to compete on
price alone and for new competitors to enter the market. Because information is available to
everyone, the Internet also raises the bargaining power of customers, who can quickly find the
lowest-cost provider on the web, which may dampen profits. The Internet also widens the
geographic market, increasing the number of competitors and reducing differences among
competitors, and makes it more difficult to sustain operational advantages.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 3-3: How do Porter's competitive forces model, the value chain model, synergies, core
competencies, and network economics help companies develop competitive strategies using
information systems?
95) You are consulting for a natural food products distributor who is interested in determining the
benefits it could achieve from implementing new information systems. What will you advise as
the first step?
A) Identify the business ecosystem the distributor is in
B) Implement a strategic transition to the new system
C) Perform a strategic systems analysis
D) Benchmark existing systems
E) Set up a strategic transition
Answer: C
Difficulty: Moderate
AACSB: Analytical thinking
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
30
Copyright © 2020 Pearson Education, Inc.
96) Sociotechnical changes affecting a firm adopting new information systems requiring
organizational change can be considered:
A) organizational adjustments.
B) strategic transitions.
C) systems alterations.
D) business goal transitions.
E) sociotechnical transitions.
Answer: B
Difficulty: Challenging
AACSB: Information technology
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
97) Research has shown that a majority of firms are able to align their information technology
with their business goals.
Answer: FALSE
Difficulty: Challenging
AACSB: Reflective thinking
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
98) The use of Internet technologies allows companies to more easily sustain competitive
advantage.
Answer: FALSE
Difficulty: Challenging
AACSB: Information technology
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
99) What are the major factors to consider when performing a strategic systems analysis?
Answer: One major factor is the structure of the industry the firm is in. For example, what
competitive forces are at work in the industry, and what is the basis for competition? What is the
nature and direction of change in the industry, and how does the industry use IT?
A second major factor is determining the firm and industry value chains. For example, how is the
company creating value for the customer? Are best practices being used and core competencies
leveraged? Is the industry supply chain or customer base changing, and what will the effect be?
Can the firm benefit from strategic partnerships or value webs? And where in the value chain
will information systems provide the greatest value to the firm?
The third major factor to consider is has the firm aligned IT with its business strategy and goals.
Have these goals been correctly stated or defined? Is IT improving the right business processes
and activities in accordance with the firm's goals? Are we using the right metrics to measure
progress?
Difficulty: Challenging
AACSB: Analytical thinking
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
31
Copyright © 2020 Pearson Education, Inc.
100) Research has shown that the more successfully a firm can align its IT with its business
goals, the more profitable it will be. What practical steps should a firm use in aligning IT with its
goals?
Answer: Steps to align IT with your organization's goals include: identifying your business
strategy and goals and breaking these goals into concrete activities and processes; identifying
how you measure progress toward these goals; determining how IT can help achieve these goals
and improve business processes and activities; and measuring the actual performance of the
business.
Difficulty: Challenging
AACSB: Application of knowledge; Information technology; Written and oral communication
LO: 3-4: What are the challenges posed by strategic information systems and how should they
be addressed?
32
Copyright © 2020 Pearson Education, Inc.
Management Information Systems, 14e (Laudon)
Chapter 4 Ethical and Social Issues in Information Systems
1) Which of the following best describes how new information systems result in legal gray areas?
A) They work with networked, electronic data, which are more difficult to control than
information stored manually.
B) They result in new situations that are not covered by old laws.
C) They are implemented by technicians rather than managers.
D) They are created from sets of logical and technological rules rather than social or
organizational mores.
E) They are little understood by politicians or lawyers.
Answer: B
Page Ref: 128
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of assess
LO: 4.1: What ethical, social, and political issues are raised by information systems?
2) Which of the following best describes the effect that new information technology has on
society?
A) It has a dampening effect on the discourse of business ethics.
B) It has a ripple effect, raising new ethical, social, and political issues.
C) It is beneficial for society as a whole, while raising dilemmas for consumers.
D) It has a waterfall effect in raising ever more complex ethical issues.
E) It has a magnifying effect, creating increasing numbers of ethical issues.
Answer: B
Page Ref: 127
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
3) The moral dimension of ________ can be described as the obligations that individuals and
organizations have concerning rights to intellectual property.
A) property rights and obligations
B) system quality
C) accountability and control
D) information rights and obligations
E) quality of life
Answer: A
Page Ref: 128
Difficulty: Easy
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
4) In the information age, the obligations that individuals and organizations have regarding the
1
Copyright © 2016 Pearson Education, Inc.
preservation of existing values and institutions fall within the moral dimension of
A) family and home.
B) property rights and obligations.
C) system quality.
D) accountability and control.
E) quality of life.
Answer: E
Page Ref: 128
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
5) Which of the following is not one of the current key technology trends that raises ethical
issues?
A) data storage improvements
B) data analysis advancements
C) increase in multimedia quality
D) increase in use of mobile devices
E) advances in networking technology
Answer: C
Page Ref: 129
Difficulty: Easy
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
6) The central business activities of ChoicePoint raise which of the five moral dimensions?
A) property rights and obligations
B) system quality
C) accountability and control
D) quality of life
E) information rights and obligations
Answer: E
Page Ref: 129
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of appraise
LO: 4.1: What ethical, social, and political issues are raised by information systems?
2
Copyright © 2016 Pearson Education, Inc.
7) The routine violation of individual privacy is made more difficult by advances in data storage.
Answer: FALSE
Page Ref: 128
Difficulty: Easy
AACSB: Information technology
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
8) In today's legal environment, business managers who violate the law through the misuse of
information systems are still unlikely to be fully prosecuted.
Answer: FALSE
Page Ref: 125
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.1: What ethical, social, and political issues are raised by information systems?
9) Identify the five moral dimensions that are involved in political, social, and ethical issues and
briefly describe each. Of these, which do you think is the most difficult for society to deal with?
Support your opinion.
Answer: The five moral dimensions are:
(1) Information rights and obligations. What rights do individuals and organizations have with
respect to information pertaining to them?
(2) Property rights and obligations. How can intellectual property rights be protected when it is
so easy to copy digital materials?
(3) Accountability and control. Who will be held accountable and liable for the harm done to
individual and collective information and property rights?
(4) System quality. What standards of data and system quality should we demand to protect
individual rights and the safety of society?
(5) Quality of life. What values should be preserved? What institutions must we protect? What
cultural values can be harmed?
Individual answers for determining the most difficult for society to deal with will vary. One
answer might be: Quality of life issues will be most difficult for society to deal with in societies
that are comprised of many different cultural and ethnic groups, such as the United States. It is
difficult to regulate concerns that are based on subjective values.
Page Ref: 128
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 4.1: What ethical, social, and political issues are raised by information systems?
3
Copyright © 2016 Pearson Education, Inc.
10) Describe three technology trends that pose ethical issues, giving an example for each of its
ethical or moral impact.
Answer: Key technology trends include the following: (1) Computer power doubling every 18
months: ethical impact—because more organizations depend on computer systems for critical
operations, these systems are vulnerable to computer crime and computer abuse; (2) Data storage
costs are rapidly declining: ethical impact—it is easy to maintain detailed databases on
individuals—who has access to and control of these databases?; (3) Data analysis advances:
ethical impact—vast databases full of individual information may be used to develop detailed
profiles of individual behavior; and (4) Networking advances and the Internet: ethical impact—it
is easy to copy data from one location to another. Who owns data? How can ownership be
protected?; (5) Mobile device growth impact: ethical impact—individual cell phones may be
tracked without user consent or knowledge.
Page Ref: 128-129
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Synthesis in terms of applying
LO: 4.1: What ethical, social, and political issues are raised by information systems?
11) ________ means that you accept the potential costs and obligations for the decisions you
make.
A) Responsibility
B) Accountability
C) Liability
D) Due process
E) Duty
Answer: A
Page Ref: 131
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
12) ________ is a feature of social institutions that means mechanisms are in place to determine
responsibility for an action.
A) Due process
B) Accountability
C) The courts of appeal
D) The judicial system
E) Liability
Answer: B
Page Ref: 131-132
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
4
Copyright © 2016 Pearson Education, Inc.
13) ________ is a societal practice of having laws that are known and understood, along with the
ability to appeal to higher authorities to ensure that the laws are applied correctly.
A) Liability
B) Due process
C) The courts of appeal
D) Accountability
E) The judicial system
Answer: B
Page Ref: 133
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
14) As discussed in the chapter, all of the following are steps in the process for analyzing an
ethical issue except
A) assigning responsibility.
B) identifying the stakeholders.
C) identifying the options you can reasonably take.
D) identifying and clearly describing the facts.
E) identifying the potential consequences of your options.
Answer: A
Page Ref: 134
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
15) A peer at work takes small amounts of office supplies for her own use at home, saying that
this is a tiny loss to the company. You tell her that if everyone were to take office supplies, then
the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
A) Kant's Categorical Imperative
B) The Golden Rule
C) The Risk Aversion Principle
D) The "No free lunch" rule
E) The slippery-slope rule
Answer: A
Page Ref: 134
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of categorize
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
5
Copyright © 2016 Pearson Education, Inc.
16) A man steals from a grocery store in order to feed his starving family. Which of the following
best expresses the Utilitarian Principle in evaluating this situation?
A) His action is acceptable, because the grocer suffers the least harm.
B) His action is acceptable, because the higher social value is the survival of the family.
C) His action is wrong, because the man would not want the grocer to steal from him.
D) His action is wrong, because if everyone were to do this, the concept of personal property is
defeated.
E) His action is wrong, because the grocery store owner is harmed.
Answer: B
Page Ref: 135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of categorize
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
17) Which of the following describes Immanuel Kant's Categorical Imperative?
A) If an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) One should take the action that produces the least harm or incurs the least cost.
C) One can put values in rank order and understand the consequences of various courses of
action.
D) If an action is not right for everyone to take, it is not right for anyone to take.
E) You should act towards others as you would like them to act towards you.
Answer: D
Page Ref: 135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
18) The ethical "no free lunch" rule states that
A) if an action cannot be taken repeatedly, then it is not right to be taken at any time.
B) one should take the action that produces the least harm or incurs the least cost.
C) one can put values in rank order and understand the consequences of various courses of
action.
D) everything is owned by someone else, and that the creator wants compensation for this work.
E) anything of value should not be taken.
Answer: D
Page Ref: 135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
6
Copyright © 2016 Pearson Education, Inc.
19) Taking the action that produces the least harm best describes the
A) Categorical Imperative.
B) Risk Aversion Principle.
C) Utilitarian Principle.
D) Golden Rule.
E) "no free lunch" rule.
Answer: B
Page Ref: 135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
20) As per the ________, if an action cannot be taken repeatedly, it is not right to take at all.
A) slippery-slope rule
B) lemming rule
C) high-failure cost rule
D) utilitarian principle
E) Golden Rule
Answer: A
Page Ref: 135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
21) Identifying the stakeholders—people who have a vested interest in the outcome of the
decision—is the last step in analyzing an ethical issue.
Answer: FALSE
Page Ref: 134
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
22) Because of their special claims to knowledge, wisdom, and respect, professionals take on
special rights and obligations.
Answer: TRUE
Page Ref: 135
Difficulty: Easy
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
7
Copyright © 2016 Pearson Education, Inc.
23) The European Parliament has yet to ban unsolicited commercial messaging.
Answer: FALSE
Page Ref: 154
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
24) Ethics describes the principles of right and wrong that can be used by individuals to make
choices to guide their behavior.
Answer: TRUE
Page Ref: 126
Difficulty: Easy
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
25) Liability is a feature of political systems and allows individuals to recover damages done to
them by others.
Answer: TRUE
Page Ref: 133
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
26) The ethical guideline that asks you to put yourself in the place of others, and think of
yourself as the object of the decision, is called the Utilitarian Principle.
Answer: FALSE
Page Ref: 135
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Comprehension
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
27) What are the steps in conducting an ethical analysis?
Answer: The steps are: (1) Identify and describe clearly the facts; (2) define the conflict or
dilemma and identify the higher-order values involved; (3) identify the stakeholders; (4) identify
the options that you can reasonably take; and (5) identify the potential consequences of your
options.
Page Ref: 134
Difficulty: Easy
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of organize
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
8
Copyright © 2016 Pearson Education, Inc.
28) Identify and discuss the six ethical principles discussed in the chapter.
Answer: The six ethical principles are the Golden Rule, Kant's Categorical Imperative,
Descartes' rule of change (slippery slope), the Utilitarian Principle, the Risk Aversion Principle,
and the "no free lunch" rule. The Golden Rule proposes: do unto others as you would have them
do unto you. Immanuel Kant's Categorical Imperative proposes, if an action is not right for
everyone to take, it is not right for anyone. Descartes' rule of change says: If an action cannot be
taken repeatedly, it is not right to take at all. The Utilitarian Principle is: Take the action that
achieves the higher or greater value. The Risk Aversion Principle is: Take the action that
produces the least harm or the least potential cost. The ethical "no free lunch" rule says: Assume
that virtually all tangible and intangible objects are owned by someone else unless there is a
specific declaration otherwise. Tangible objects are owned by someone else unless there is a
specific declaration otherwise.
Page Ref: 134-135
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of summarize
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
29) Define the basic concepts of responsibility, accountability, and liability as applied to ethical
decisions. How are these concepts related?
Answer: Responsibility is the first key element of ethical action. Responsibility means that an
individual, group, or organization accepts the potential costs, duties, and obligations for
decisions made. Accountability is a feature of systems and social institutions. It means that
mechanisms are in place to determine who took responsible action; i.e., who is responsible for
the action. Liability is a feature of political systems in which a body of law is in place that
permits individuals to recover the damages done to them by others.
These concepts are related as follows: I will assume the blame or benefit for the actions I take
(responsibility); this blame or benefit accrues to me through the requirement that I be able to
explain why I have taken the actions I have (accountability) for actions traceable to me by
defined mechanisms in the organization, and if those actions result in harm to another, I will be
held by law to reparations for those actions (liability).
Page Ref: 131-133
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of examine
LO: 4.2: What specific principles for conduct can be used to guide ethical decisions?
9
Copyright © 2016 Pearson Education, Inc.
30) ________ is the use of computers to assemble data from different sources to create electronic
dossiers of detailed information about individuals.
A) Profiling
B) Phishing
C) Spamming
D) Targeting
E) Spyware
Answer: A
Page Ref: 129
Difficulty: Easy
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
31) ________ is a new data analysis technology that finds hidden connections between data in
disparate sources.
A) HIPAA
B) FIP
C) NORA
D) COPPA
E) Spyware
Answer: C
Page Ref: 130
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
32) In 2010, the FTC added all of the following recommendations to its privacy guidelines
except
A) firms should build products and services that protect privacy.
B) firms should increase the transparency of their data collection.
C) firms should require consumer consent and provide clear options to opt out of data collection.
D) firms should limit the length of time that any personal data is stored to six months or less.
E) consumers should be able to review and contest the accuracy and completeness of data.
Answer: D
Page Ref: 137
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
10
Copyright © 2016 Pearson Education, Inc.
33) ________ restricts the information that the U.S. federal government can collect about an
individual and regulates what it can do with the information.
A) The Privacy Act of 1974
B) The Gramm-Leach-Bliley Act of 1999
C) The Freedom of Information Act
D) The FIP set of principles
E) COPPA
Answer: A
Page Ref: 136
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
34) Which of the following best describes the basis for the FIP principles?
A) the accountability of the record holder
B) the responsibility of the record holder
C) the mutuality of interest between the record holder and the individual
D) the privacy of the individual
E) the difference between the interests of the individual and commercial organizations
Answer: C
Page Ref: 136
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
35) The Federal Trade Commission FIP principle of Notice/Awareness states that
A) customers must be allowed to choose how their information will be used for secondary
purposes other than the supporting transaction.
B) data collectors must take responsible steps to assure that consumer information is accurate
and secure from unauthorized use.
C) there must be a mechanism in place to enforce FIP principles.
D) consumers should be able to review the data collected about them.
E) Web sites must disclose their information practices before collecting data.
Answer: E
Page Ref: 137
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
11
Copyright © 2016 Pearson Education, Inc.
36) Which of the following U.S. laws gives patients access to personal medical records and the
right to authorize how this information can be used or disclosed?
A) HIPAA
B) Gramm-Leach-Bliley Act
C) Privacy Protection Act
D) Freedom of Information Act
E) COPPA
Answer: A
Page Ref: 138
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
37) Privacy protection in the United States is ________ in Europe.
A) more far reaching than
B) more liable to laws than
C) much more stringent than
D) much less stringent than
E) at about the same level of strictness as
Answer: D
Page Ref: 139
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
38) U.S. businesses are allowed to use personal data from EU countries if they
A) have informed consent.
B) create a safe harbor.
C) develop equivalent privacy protection policies.
D) make their privacy protection policies publicly available.
E) register their activities with a central EU government databank.
Answer: C
Page Ref: 139
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
12
Copyright © 2016 Pearson Education, Inc.
39) Cookies created during Web site visits are stored
A) on the Web site's server.
B) on the user's computer.
C) on servers owned by advertising networks.
D) in the browser's application settings.
E) nowhere, because they are only used during a visit and are discarded once a visitor leaves the
Web site.
Answer: B
Page Ref: 140
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
40) The ________ framework developed by the U.S. Department of Commerce allows U.S.
businesses to legally use personal data from EU countries.
A) COPPA
B) P3P
C) PGP
D) bilateral
E) safe-harbor
Answer: E
Page Ref: 139
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
41) The Online Privacy Alliance
A) encourages self regulation to develop a set of privacy guidelines for its members.
B) protects user privacy during interactions with Web sites.
C) has established technical guidelines for ensuring privacy.
D) is a government agency regulating the use of customer information.
E) is a lobbying organization promoting the online privacy interests of consumers.
Answer: A
Page Ref: 143
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
13
Copyright © 2016 Pearson Education, Inc.
42) In the ________ model of informed consent, personal information can be collected until the
consumer specifically requests that his or her data not be collected.
A) opt-in
B) opt-out
C) P3P
D) PGP
E) IPA
Answer: B
Page Ref: 143
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
43) Which of the following is not one of the types of information gathered by Web site tracking
tools?
A) health concerns
B) birthplace
C) income
D) purchases
E) marital status
Answer: B
Page Ref: 141
Difficulty: Moderate
AACSB: Information technology
CASE: Analysis in terms of examine
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
44) The limitation of trade secret protection for software is that it is difficult to prevent the ideas
in the work from falling into the public domain when
A) the courts become involved.
B) hackers are able to break into the source code.
C) the software is widely distributed.
D) a new version of the software is released.
E) the software's programming code is released.
Answer: C
Page Ref: 145
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
14
Copyright © 2016 Pearson Education, Inc.
45) Which of the following best describes intellectual property?
A) intangible property created by individuals or corporations
B) unique creative work or ideas
C) tangible or intangible property created from a unique idea
D) the expression of an intangible idea
E) any tangible or intangible property within the creative arts
Answer: A
Page Ref: 145
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
46) ________ protects the creators of intellectual property from having their work copied by
others.
A) Patent protection
B) Intellectual property law
C) Copyright law
D) Fair Use Doctrine
E) Trade Secret law
Answer: C
Page Ref: 145
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
47) "Look and feel" copyright infringement lawsuits are concerned with
A) the distinction between tangible and intangible ideas.
B) the distinction between an idea and its expression.
C) using the graphical elements of another product.
D) using the creative elements of another product.
E) preventing the use of another product's graphical user interface.
Answer: B
Page Ref: 145
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
15
Copyright © 2016 Pearson Education, Inc.
48) The strength of patent protection is that it
A) puts the strength of law behind copyright.
B) allows protection from Internet theft of ideas put forth publicly.
C) is easy to define.
D) provides a clear distinction between software and books.
E) grants a monopoly on underlying concepts and ideas.
Answer: E
Page Ref: 146
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
49) One of the drawbacks of patent protection is
A) that only the underlying ideas are protected.
B) digital media cannot be patented.
C) preventing the ideas from falling into public domain.
D) the years of waiting to receive it.
E) the limited period of protection.
Answer: D
Page Ref: 146
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
50) The ________ brought copyright law to the Internet age by outlawing the circumvention of
technology-based protections of copyrighted materials.
A) Digital Millennium Copyright Act
B) Privacy Act
C) Freedom of Information Act
D) Electronic Communications Privacy Act
E) Computer Software Copyright Act
Answer: A
Page Ref: 147
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
16
Copyright © 2016 Pearson Education, Inc.
51) Unlike regular browser cookies, Flash cookies
A) are installed only at the user's request.
B) are not stored on the user's computer.
C) cannot be easily detected or deleted.
D) monitor the user's behavior at a Web site.
E) are able to track much more of the user's personal information
Answer: C
Page Ref: 140
Difficulty: Moderate
AACSB: Information technology
CASE: Analysis in terms of compare
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
52) ________ enables advertisers to display more relevant ads based on user's search and
browsing history.
A) Behavioral targeting
B) A Web bug
C) NORA
D) An intelligent agent
E) FIP
Answer: A
Page Ref: 141
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
53) ________ prohibits an organization from collecting any personal information unless the
individual specifically takes action to approve information collection and use.
A) A legal safe harbor
B) The opt-in model
C) The FIP set of guidelines
D) P3P
Answer: B
Page Ref: 143
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
17
Copyright © 2016 Pearson Education, Inc.
54) Which legal mechanism grants the owner exclusive ownership of the ideas behind an
invention for 20 years?
A) copyright
B) trademark
C) patent
D) trade secret protection
Answer: C
Page Ref: 146
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
55) A Facebook users' visit to a Web site can be tracked even if they do not click a Like button.
Answer: TRUE
Page Ref: 141
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
56) Malicious software that is installed secretly on your computer by other applications and that
tracks your online movements is called spyware.
Answer: TRUE
Page Ref: 142
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
57) Most Internet businesses do very little to protect the privacy of their customers.
Answer: TRUE
Page Ref: 144
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
18
Copyright © 2016 Pearson Education, Inc.
58) The rate of global piracy is approximately 42%.
Answer: TRUE
Page Ref: 147
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
59) Any intellectual work product that isn't based on public knowledge can be classed as a trade
secret.
Answer: TRUE
Page Ref: 145
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
60) Copyright is the legal protection afforded intellectual property, including drawings, movies,
and maps.
Answer: TRUE
Page Ref: 145
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
61) Software programs were unprotected by copyright law until the early 1990s.
Answer: FALSE
Page Ref: 145
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
62) The problem with Web browsers' Do Not Track options is that Web sites aren't obligated to
honor these settings.
Answer: TRUE
Page Ref: 144
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
19
Copyright © 2016 Pearson Education, Inc.
63) According to several court findings, the general functional features of software are protected
by copyright law.
Answer: FALSE
Page Ref: 146
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
64) One of the key concepts in patent law is novelty.
Answer: TRUE
Page Ref: 146
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
65) In recent years, the illegal sharing of music files has declined with the improvement of
technological prevention.
Answer: TRUE
Page Ref: 147
Difficulty: Easy
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
66) COPPA is a set of five principles developed by the FTC that most American and European
privacy law is based on.
Answer: FALSE
Page Ref: 137
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
20
Copyright © 2016 Pearson Education, Inc.
67) Although online tracking gathers an enormous amount of information on individual users, it
is anonymous and can't be tied to a specific person.
Answer: FALSE
Page Ref: 141
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
68) Web beacons are tiny, invisible software programs hidden in e-mail messages and Web pages
that are used to track and report a user's online behavior.
Answer: TRUE
Page Ref: 140
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
69) What are the major issues concerning privacy in the information age? Do you believe the
need for homeland security should overrule some of the personal privacy and information rights
we have previously taken for granted? Why or why not?
Answer: One answer might be that we should depend upon the Federal Trade Commission Fair
Information Practice Principles and that as long as these principles are not ignored or overset,
personal privacy does not conflict with homeland security. This is a weak argument. Other issues
involve online privacy, employee monitoring, tradeoffs between security and privacy and good
business results versus privacy.
Page Ref: 136-144
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Evaluation in terms of assess
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
21
Copyright © 2016 Pearson Education, Inc.
70) Describe how a cookie works.
Answer: A cookie works as follows: A user opens a Web browser and selects a site to visit. The
user's computer sends a request for information to the computer running at the Web site. The
Web site computer is called the server, since it allows the user's computer to display the Web site.
At the same time it sends a cookie—a data file containing information like an encrypted user ID
and information about when the user visited and what he did on the site. The user's computer
receives the cookie and places it in a file on the hard drive. Whenever the user goes back to the
Web site, the server running the site retrieves the cookie to help identify the user.
Page Ref: 140
Difficulty: Moderate
AACSB: Information technology
CASE: Analysis in terms of summarize
LO: 4.3: Why do contemporary information systems technology and the Internet pose
challenges to the protection of individual privacy and intellectual property?
71) Key differences between software and books include all of the following except
A) software contains more information than a book.
B) software is less easily inspected than a book.
C) software products are more easily compared to each other than books.
D) software is understood to be more fallible than a book.
E) it is more difficult to inspect software for flaws.
Answer: C
Page Ref: 149
Difficulty: Easy
AACSB: Analytical thinking
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
72) When a software product is considered ________, it becomes difficult to hold software
producers liable for flaws in their product.
A) to be part of a machine
B) similar to books
C) a service
D) to be an artistic expression
E) a tangible product rather than a service
Answer: B
Page Ref: 149
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
22
Copyright © 2016 Pearson Education, Inc.
73) ________ are not held liable for the messages they transmit.
A) Regulated common carriers
B) Private individuals
C) Organizations and businesses
D) Elected officials
E) European ISPs
Answer: A
Page Ref: 149
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
74) Companies can't realistically create error-free software because
A) any programming code is susceptible to error.
B) it is too expensive to create perfect software.
C) errors can be introduced in the maintenance stage of development.
D) any software of any complexity will have errors.
E) many errors are brought on by the user's operating system.
Answer: B
Page Ref: 150
Difficulty: Moderate
AACSB: Information technology
CASE: Analysis in terms of assess, compare
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
75) The most common reason business systems fail is
A) software bugs.
B) software errors.
C) hardware failures.
D) facilities failures.
E) data quality.
Answer: E
Page Ref: 150
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
23
Copyright © 2016 Pearson Education, Inc.
76) Which of the following is a primary drawback to the "do anything anywhere" computing
environment?
A) It makes work environments less pleasant.
B) It creates inequality between workers who have home computing power and those who don't.
C) It centralizes power at corporate headquarters.
D) It blurs the traditional boundaries between work and family time.
E) It leads to employees being paid less for the total amount of work performed.
Answer: D
Page Ref: 151
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
77) Which of the following is the primary reason that the practice of spamming has grown
exponentially?
A) Telephone solicitation is no longer legal.
B) It is good advertising practice and brings in many new customers.
C) It helps pay for the Internet.
D) It is very inexpensive and can reach so many people.
E) There are no legal preventions against it.
Answer: D
Page Ref: 153
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
78) The U.S. CAN-SPAM Act of 2003
A) makes spamming illegal.
B) requires spammers to identify themselves.
C) has dramatically cut down spamming.
D) does not override state anti-spamming laws.
E) does not outlaw the use of fake return addresses.
Answer: B
Page Ref: 154
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
24
Copyright © 2016 Pearson Education, Inc.
79) Spamming raises the moral dimension of
A) quality of life.
B) system quality.
C) accountability and control.
D) information rights and obligations.
E) property rights and obligations.
Answer: A
Page Ref: 153
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of assess
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
80) Re-designing and automating business processes can be seen as a double-edged sword
because
A) increases in efficiency may be accompanied by job losses.
B) increases in efficiency may be accompanied by poor data quality.
C) support for middle-management decision making may be offset by poor data quality.
D) reliance on technology results in the loss of hands-on knowledge.
E) senior executives may not approve the changes.
Answer: A
Page Ref: 154
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Analysis in terms of assess
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
81) The extreme difference among different social groups regarding their access to computers
and the Internet is called the ________ divide.
A) computer
B) technology
C) digital
D) electronic
E) Internet
Answer: C
Page Ref: 155
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
25
Copyright © 2016 Pearson Education, Inc.
82) CVS refers to
A) eyestrain related to computer display screen use.
B) a business practice that attempts to evaluate the intangible values of computer systems.
C) carpal vision syndrome.
D) a type of antivirus protection software.
E) wrist injuries brought about by incorrect hand position when using a keyboard.
Answer: A
Page Ref: 156
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
83) Which of the following ailments is caused by tens of thousands of repetitions under lowimpact loads?
A) CTS
B) CVS
C) RSI
D) technostress
E) RSS
Answer: C
Page Ref: 155
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
84) Gaining unapproved access to a computer is not a federal crime.
Answer: FALSE
Page Ref: 152
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
85) Spam is legally defined as any e-mail that is unsolicited.
Answer: FALSE
Page Ref: 153
Difficulty: Easy
AACSB: Information technology
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
26
Copyright © 2016 Pearson Education, Inc.
86) The symptoms of technostress include aggravation and hostility toward humans.
Answer: TRUE
Page Ref: 156
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
87) Computer abuse refers to acts involving the computer that may not be illegal but are
considered unethical.
Answer: TRUE
Page Ref: 153
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
88) One of the capabilities of Internet communication is the ability of the individual to appear
essentially anonymous by using made-up user names. Is anonymity the same thing as privacy,
and should it be a right? What ethical issues are raised by increased anonymity?
Answer: Student answers will vary, but should include a definition of privacy and an attempt to
differentiate between anonymity and privacy, as well as an understanding that anonymity can
result in a breakdown of clear accountability or responsibility for actions. A sample answer is:
Privacy is the claim to be left alone, free from surveillance. This is different from anonymity, in
which nobody knows who you are or what actions you take even in a public arena. Some
individuals, if they feel they are anonymous, may have lapses in ethical behavior because
anonymity means they are no longer accountable for their actions. I don't know if anonymity
should be a right, but perhaps anonymity should not be permissible for some types of
communication.
Page Ref: 136-138
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Evaluation in terms of assess
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
27
Copyright © 2016 Pearson Education, Inc.
89) What do you consider to be the primary ethical, social, and political issues regarding the
quality of a software product?
Answer: Student answers will vary, but should include a description of the software
manufacturer's responsibility in software quality and an understanding of the difference between
social concerns (culture, lifestyle effects) and political concerns (legal, institutional effects). A
sample answer is: The central quality-related ethical issue that software quality raises is what
responsibility does a software manufacturer have in the performance of its software? At what
point can the manufacturer conclude that its software achieves an adequate level of quality? The
leading social issue raised by quality is: how is our society affected by low-quality software and
is this a concern? And how much accountability should the software manufacturer have? The
central political concern raised by software quality is whether and how to enforce software
quality minimums and standards, and what institutions are thus also held accountable.
Page Ref: 149-150
Difficulty: Moderate
AACSB: Ethical understanding and reasoning
CASE: Synthesis in terms of devising
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
90) How does the use of electronic voting machines act as a "double-edged sword?" What moral
dimensions are raised by this use of information technology?
Answer: Electronic voting machines can be seen as beneficial by making voting easy to
accomplish and tabulate. However, it may be easier to tamper with electronic voting machines
than with countable paper ballots. In terms of information rights, it seems possible that methods
could be set up to determine how an individual has voted and to store and disseminate this
knowledge. Manufacturers of voting machines claim property rights to the voting software,
which means that if the software is protected from inspection, there is no regulation in how the
software operates or how accurate it is. In terms of accountability and control, if an electronic
voting system malfunctions, will it be the responsibility of the government, of the company
manufacturing the machines or software, or the programmers who programmed the software?
The dimension of system quality raises questions of how the level of accuracy of the machines is
to be judged and what level is acceptable? In terms of quality of life, while it may make voting
easier and quicker, does the vulnerability to abuse of these systems pose a threat to the
democratic principle of one person, one vote?
Page Ref: 148-153
Difficulty: Difficult
AACSB: Ethical understanding and reasoning
CASE: Synthesis in terms of applying
LO: 4.4: How have information systems affected laws for establishing accountability, liability,
and the quality of everyday life?
28
Copyright © 2016 Pearson Education, Inc.
Management Information Systems: Managing the Digital Firm, 16e (Laudon)
Chapter 5 IT Infrastructure and Emerging Technologies
1) Which type of infrastructure service stores and manages corporate data and provides
capabilities for analyzing the data?
A) Networking
B) Telephone
C) VOIP
D) Telecommunications
E) Data management
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
2) Which of the following is not an IT infrastructure service component?
A) Operating system software
B) Computing platforms to provide a coherent digital environment
C) Physical facilities management to manage the facilities housing physical components
D) IT management services to plan and develop the infrastructure and provide project
management
E) IT education services that provide training to employees
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
3) Specifications that establish the compatibility of products and the ability to communicate in a
network are called:
A) network standards.
B) telecommunications standards.
C) technology standards.
D) Internet standards.
E) compatibility standards.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
1
Copyright © 2020 Pearson Education, Inc.
4) A(n) ________ is used to communicate between a user and an organization's back-end
systems.
A) public server
B) private server
C) legacy server
D) application server
E) blade server
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
5) Place the following eras of IT infrastructure evolution in order, from earliest to most recent: 1.
Cloud Computing Era; 2. Client/Server; 3. Enterprise Era; 4. Personal Computer; and 5.
Mainframe and Minicomputer.
A) 5, 2, 3, 4, 1
B) 5, 4, 2, 3, 1
C) 4, 5, 2, 3, 1
D) 5, 4, 2, 1, 3
E) 4, 5, 3, 2, 1
Answer: B
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
6) The introduction of the minicomputer:
A) allowed computers to be customized to the specific needs of departments or business units.
B) strengthened centralized computing.
C) offered new, powerful machines at higher prices than mainframes.
D) represented the rise of Microsoft.
E) was dominated by IBM.
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
2
Copyright © 2020 Pearson Education, Inc.
7) A client computer networked to a server computer, with processing split between the two
types of machines, is called a(n):
A) service-oriented architecture.
B) on-demand architecture.
C) multi-tiered client/server architecture.
D) two-tiered client/server architecture.
E) divided architecture.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
8) In a multi-tiered network:
A) the work of the entire network is centralized.
B) the work of the entire network is balanced over several levels of servers.
C) processing is split between clients and servers.
D) processing is handled by multiple, geographically-remote clients.
E) processing is located in the cloud.
Answer: B
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
9) Interpretations of Moore's law assert that:
A) computing power will eventually level off.
B) transistors decrease in size 50% every two years.
C) data storage costs decrease by 50% every 18 months.
D) PCs decrease in market share by 9% every 5 years.
E) computing power doubles every 18 months.
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
3
Copyright © 2020 Pearson Education, Inc.
10) Today's computer transistors are roughly equivalent in size to:
A) the width of a fingernail.
B) a human hair.
C) a virus.
D) several atoms.
E) a grain of sand.
Answer: C
Difficulty: Moderate
AACSB: Reflective thinking
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
11) Which of the following became the standard PC in the Personal Computer Era?
A) Wintel PC
B) DOS PC
C) MITS PC
D) Altair
E) Apple II
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
12) ________ uses individual atoms and molecules to create computer chips and other devices.
A) Virtualization
B) Nanotechnology
C) Quantum computing
D) A minicomputer
E) On-demand computing
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
4
Copyright © 2020 Pearson Education, Inc.
13) ________ states that the value or power of a network grows exponentially as a function of
the number of network members.
A) Metcalfe's Law
B) Moore's Law
C) Law of scalability
D) Law of outsourcing
E) Law of networks
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
14) Which of the following factors does not help explain why computing resources today are
even more available than in previous decades?
A) Network economics
B) Law of mass digital storage
C) Moore's law
D) Declining communications costs and the Internet
E) Widespread rejection of technology standards
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
15) Client/server computing is a primary example of decentralized processing.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
16) In N-tier computing, significant parts of website content, logic, and processing are performed
by a single web server.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
17) A web server is responsible for locating and managing stored webpages.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
5
Copyright © 2020 Pearson Education, Inc.
18) IT infrastructure consists of only those physical computing devices and software required to
operate the enterprise.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
19) An application server may reside on the same computer as a web server or on its own
dedicated computer.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
20) Enterprise infrastructure requires software that can link disparate applications and enable
data to flow freely among different parts of the business.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
21) It is much harder to eliminate a cloud service than to remove functionality from a company's
core internal systems.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
22) In financial services firms, investments in IT infrastructure represent more than half of all
capital invested.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
23) Microsoft is no longer the market leader in client/server networking.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
6
Copyright © 2020 Pearson Education, Inc.
24) Mobile computing is the fastest growing form of computing.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
25) Exponential growth in the number of transistors and the power of processors is expected to
decrease in the foreseeable future.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
26) List and describe four services that comprise IT infrastructure, beyond physical devices and
software applications.
Answer:
• The service components of IT infrastructure include:
• Telecommunications services that provide data, voice, and video connectivity.
• Data management services to store, manage, and analyze data.
• Application software services that provide enterprise-wide capabilities.
• Physical facilities management services, to develop and manage physical installations of
technology.
• IT standards services that establish and monitor the firm's policies.
• IT education services that provide training in use of the systems.
• IT research and development services that research potential projects, products, and
investments.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
7
Copyright © 2020 Pearson Education, Inc.
27) Explain why standards are so important in information technology. What standards have
been important for the growth of Internet technologies?
Answer: Standards are important because they result in different manufacturers creating
products that can be used either with each other or to communicate with each other. For example,
without standards, each light-bulb manufacturer would have to also create specific light-bulb
sockets for use with their light bulbs. In the same way, computers and computer technology have
been enabled through standards. Standards have allowed many different manufacturers to
contribute to the same, standardized definitions of a technological application. For example, the
ASCII data standards made it possible for computer machines from different manufacturers to
exchange data, and standardized software languages have enabled programmers to write
programs that can be used on different machines.
The standards that have been important for the growth of the Internet include TCP/IP, as a
networking standard, and WWW standards for displaying information as web pages, including
HTML.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-1: What is IT infrastructure and what are the stages and drivers of IT infrastructure
evolution?
28) Which of the following is a multitasking, multiuser, operating system developed by Bell
Laboratories that operates on a wide variety of computing platforms?
A) Unix
B) Linux
C) OS X
D) COBOL
E) DOS
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
29) Which of the following is the network standard for connecting desktop computers into local
area networks that enabled the widespread adoption of client/server computing and local area
networks and further stimulated the adoption of personal computers?
A) TCP/IP
B) COBOL
C) Ethernet
D) ASCII
E) Linux
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
8
Copyright © 2020 Pearson Education, Inc.
30) The development of TCP/IP occurred during the ________ era.
A) cloud and mobile computing
B) general-purpose mainframe and minicomputer
C) client/server era
D) personal computer
E) mainframe
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
31) Which of the following is a leading networking hardware provider?
A) Dell
B) Intel
C) Seagate
D) IBM
E) Cisco
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
32) The Windows Operating System:
A) was an early PC operating system.
B) is used on virtually all tablet and mobile devices today.
C) is a data management application used on PCs.
D) is an operating system used on most Wintel PCs throughout the world.
E) is a web-based operating system for the Internet era.
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
33) Infrastructure-as-a-Service (IaaS):
A) is one type of cloud computing service where users pay only for the computing capacity they
actually use.
B) is a cloud-based service which provides software applications to users on demand.
C) is a cloud-based service that provides a platform for software development.
D) provides users with a service-oriented architecture for their systems.
E) provides cloud users with ubiquitous networking environment.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
9
Copyright © 2020 Pearson Education, Inc.
34) Which of the following is an example of a legacy system?
A) Transaction processing system running on a mainframe
B) Scalable grid computing system
C) Web services running on a cloud computing platform
D) MDM software
E) Quantum computing system
Answer: A
Difficulty: Challenging
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
35) Which of the following is not a part of the IT infrastructure ecosystem found in firms?
A) Consultant and system integrators
B) Internet platforms
C) Operating system platforms
D) Enterprise software applications
E) Virtual reality systems
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
36) All of the following are typically factors in a firm's decision to engage consulting and system
integration services except:
A) the firm does not have the staff necessary to deploy and maintain the firm's IT infrastructure.
B) the firm's staff do not have the skills necessary to deploy and maintain the firm's IT
infrastructure.
C) The firm does not have the budget to deploy and maintain a firm's IT infrastructure.
D) The firm's staff does not have the necessary experience to deploy and maintain the firm's IT
infrastructure.
E) The firm's staff knows more about the firm's IT infrastructure than service providers.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
37) The marketplace for computer hardware:
A) has become increasingly concentrated in top firms.
B) has expanded to include a wide variety of start-up and mobile-computing firms.
C) has moved significantly to Asian firms.
D) has been decimated by mobile and cloud computing.
E) has begun moving away from blade servers.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
10
Copyright © 2020 Pearson Education, Inc.
38) Which of the following is the most popular mobile operating system?
A) Linux
B) Android
C) Chrome OS
D) iOS
E) Unix
Answer: B
Difficulty: Moderate
AACSB: Analytical thinking
LO: 5-2: What are the components of IT infrastructure?
39) The operating system is used to manage the software applications used in business activities.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
40) Web hosting services maintain a series of servers and provide fee-paying subscribers with
space to maintain their websites.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
41) Have mainframes disappeared?
Answer: Mainframes have not disappeared. They continue to be used to reliably and securely
handle huge volumes of transactions, for analyzing very large quantities of data, and for handling
large workloads in cloud computing centers. The mainframe is still the digital workhorse for
banking and telecommunications networks that are often running software programs that are
older and require a specific hardware platform. Currently, mainframes process 30 billion
business transactions per day, and 80 percent of the world's corporate data also originates on the
mainframe.
Difficulty: Moderate
AACSB: Information technology
LO: 5-2: What are the components of IT infrastructure?
11
Copyright © 2020 Pearson Education, Inc.
42) Briefly explain why corporations are increasingly interested in using Unix or Linux for their
operating systems.
Answer: Linux is an inexpensive and robust open-source relative of Unix. Unix and Linux
constitute the backbone of corporate infrastructure throughout much of the world because they
are scalable, reliable, and much less expensive than mainframe operating systems. They can also
run on many different types of processors. The major providers of Unix operating systems are
IBM, HP, and Sun with slightly different and partially incompatible versions.
Although Windows continues to dominate the client marketplace, many corporations have begun
to explore Linux as a low-cost desktop operating system provided by commercial vendors such
as RedHat Linux and Linux-based desktop productivity suites such as Sun's StarOffice. Linux is
also available in free versions downloadable from the Internet as open-source software. The rise
of open-source software, particularly Linux and the applications it supports at the client and
server level, has profound implications for corporate software platforms: cost, reduction,
reliability and resilience, and integration, because Linux works on all the major hardware
platforms from mainframes to servers to clients. Linux has the potential to break Microsoft's
monopoly on the desktop. Sun's StarOffice has an inexpensive Linux-based version that
competes with Microsoft's Office productivity suite.
Difficulty: Moderate
AACSB: Analytical thinking
LO: 5-2: What are the components of IT infrastructure?
43) Which of the following is not an example of a wearable computing device?
A) Smartwatch
B) Smart glasses
C) Smartphones
D) Activity trackers
E) Smart ID badges
Answer: C
Difficulty: Challenging
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
44) Which of the following is not an example of the mobile digital platform?
A) Tablets
B) Kindle
C) Cell phones
D) CRM
E) Smartwatches
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
12
Copyright © 2020 Pearson Education, Inc.
45) All of the following are current hardware platform trends except:
A) green computing.
B) virtualization.
C) cloud computing.
D) Unix.
E) quantum computing.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
46) The ability to be in multiple states at once, dramatically increasing processing power, is a
hallmark of:
A) colocation.
B) edge computing.
C) grid computing.
D) utility computing.
E) quantum computing.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
47) Which of the following is a recent addition to the mobile digital platform?
A) Quantum computing devices
B) Wearable computing devices
C) Cloud computing devices
D) Grid computing devices
E) Green computing devices
Answer: B
Difficulty: Moderate
AACSB: Analytical thinking
LO: 5-3: What are the current trends in computer hardware platforms?
48) At what percent of capacity do most servers operate?
A) 100%
B) 80-90%
C) Approximately 70 percent
D) 40-50%
E) 15-20%
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
13
Copyright © 2020 Pearson Education, Inc.
49) Which of the following enables a single physical resource (such as a server or a storage
device) to appear to the user as multiple logical resources?
A) Cloud computing
B) Autonomic computing
C) Virtualization
D) Multicore processing
E) Ubiquitous computing
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
50) Which of the following types of computing involves purchasing computing power from a
remote provider and paying only for the computing power used?
A) On-demand
B) Grid
C) Edge
D) Autonomic
E) Quantum
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
51) All of the following are cloud computing services except:
A) infrastructure as a service.
B) platform as a service.
C) software as a service.
D) on-demand computing.
E) virtualization as a service.
Answer: E
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-3: What are the current trends in computer hardware platforms?
52) Firms that allow employees to use their own devices are embracing which of the following?
A) Wearable computing
B) Mobile consolidation
C) Cloud computing
D) BYOD
E) Self computing
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
14
Copyright © 2020 Pearson Education, Inc.
53) Which of the following is not one of the characteristics of cloud computing, as defined by the
U.S. National Institute of Standards and Technology?
A) Ubiquitous network access
B) Location-independent resource pooling
C) On-demand self service
D) Measured service
E) Reduced elasticity
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
54) Which of the following is not an example of the consumerization of IT?
A) Google Apps
B) Dropbox
C) Facebook
D) Gmail
E) Amazon Web Services
Answer: E
Difficulty: Challenging
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
55) A(n) ________ is an integrated circuit which contains two or more processors to enhance
performance and reduce power consumption.
A) multicore processor
B) legacy processor
C) scalable processor
D) aggregate circuit
E) green circuit
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
15
Copyright © 2020 Pearson Education, Inc.
56) SaaS refers to:
A) supplying online access over networks to storage devices and storage area network
technology.
B) managing combinations of applications, networks, systems, storage, and security as well as
providing Web site and systems performance monitoring to subscribers over the Internet.
C) self-contained services that communicate with each other to create a working software
application.
D) easy-to-use software tools for displaying Web pages.
E) hosting and managing access to software applications delivered over the Internet to clients on
a subscription basis.
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
57) Which of the following involves practices and technologies to minimize the environmental
effects of manufacturing and managing computing devices?
A) Capacity planning
B) Cloud computing
C) Green computing
D) Utility computing
E) On-demand computing
Answer: C
Difficulty: Easy
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
58) In green computing, reducing computer power consumption is not a top priority.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
59) Quantum computing is implemented primarily with enterprise or ISP servers.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
60) Quantum computing is not yet available to the general public.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-3: What are the current trends in computer hardware platforms?
16
Copyright © 2020 Pearson Education, Inc.
61) Distinguish between cloud computing, green computing, and quantum computing.
Answer: In cloud computing, technology services are provided over a network, primarily the
Internet. These may be infrastructure services, such as storage or networking, or platform
services, such as IBM's application development and test service, or software services, such as
salesforce.com. Green computing refers to practices and technologies for designing computer
equipment to minimize impact on the environment. Quantum computing refers to emerging
technology that uses the principles of quantum physics to dramatically boost computer
processing power.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-3: What are the current trends in computer hardware platforms?
62) An ad-hoc group of oceanographers needs to set up a system to analyze massive amounts of
data on ocean temperatures. The technology and hardware for gathering the data and transmitting
the data to a central computer is in place. What additional hardware might they need? What
techniques might they use to make their research more efficient and lower costs?
Answer: To store their data they may want to use a SAN. To process their data, they will need a
supercomputer. To lower costs, they could look at on-demand computing as well as virtualization
and implementing multicore processors.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-3: What are the current trends in computer hardware platforms?
63) What are the drawbacks of cloud computing? Do you think these ever outweigh the benefits,
and if so, in what cases?
Answer: Students should be able to identify at least two drawbacks. Drawbacks include:
1. placing data storage and control in another firm's hands.
2. security risks in having critical systems and data entrusted to a firm that does business with
other firms.
3. loss of business capability if cloud infrastructures malfunction.
4. dependence on cloud computing provider and switching costs.
Student answers regarding the relative weight will vary, an example is: The disadvantages of
cloud computing outweigh the advantages, except if any data lost is irreplaceable or creates harm
to others. For example, a database of financial information should remain the responsibility of
the original firm so that they can be held accountable.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-3: What are the current trends in computer hardware platforms?
17
Copyright © 2020 Pearson Education, Inc.
64) What are the essential characteristics of cloud computing?
Answer: As defined by the U.S. National Institute of Standards and Technology, cloud
computing is characterized by on-demand self-service, ubiquitous network access, locationindependent resource pooling, rapid elasticity, and measured service. On-demand self-service
means that consumers can use server time and network storage as they need it on their own.
Ubiquitous network refers to the ability to access cloud resources across all devices and
platforms, including mobile. Location independent resource pooling describes the ability to
allocate resources to any part of the world without a dip in service quality. Rapid elasticity is the
capacity for resources to be increased or decreased as needed to meet demand. Lastly, measured
service refers to the payment technique whereby users are charged based on the resources they
use, as opposed to monthly or yearly rates.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 5-3: What are the current trends in computer hardware platforms?
65) What is virtualization and how and why is it used?
Answer: Virtualization is the process of presenting a set of computing resources (such as
computing power or data storage) so that they can all be accessed in ways that are not restricted
by physical configuration or geographic location. Virtualization enables a single physical
resource (such as a server or a storage device) to appear to the user as multiple logical resources.
For example, a server or mainframe can be configured to run many instances of an operating
system (or different operating systems) so that it acts like many different machines. Each virtual
server "looks" like a real physical server to software programs, and multiple virtual servers can
run in parallel on a single machine. Server virtualization is a common method of reducing
technology costs by providing the ability to host multiple systems on a single physical machine.
Most servers run at just 15 to 20 percent of capacity, and virtualization can boost utilization
server utilization rates to 70 percent or higher. Higher utilization rates translate into fewer
computers required to process the same amount of work, reduced data center space to house
machines, and lower energy usage. Virtualization also facilitates centralization and consolidation
of hardware administration. Virtualization also enables multiple physical resources (such as
storage devices or servers) to appear as a single logical resource, as in software-defined storage
(SDS), which separates the software for managing data storage from storage hardware. Using
software, firms can pool and arrange multiple storage infrastructure resources and efficiently
allocate them to meet specific application needs. SDS enables firms to replace expensive storage
hardware with lower-cost commodity hardware and cloud storage hardware. There is less underor over-utilization of storage resources.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 5-3: What are the current trends in computer hardware platforms?
18
Copyright © 2020 Pearson Education, Inc.
66) ZipRealty, which combines Google Maps with real estate data, is an example of:
A) cloud computing.
B) SOA.
C) a widget.
D) a mashup.
E) a web service.
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
67) Which type of software is created and updated by a worldwide community of programmers
and available for free?
A) Software packages
B) Mashups
C) Outsourced
D) Open source
E) Closed source
Answer: D
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
68) Which of the following is not one of the current software platform trends?
A) Web services and service-oriented architecture
B) Open-source software
C) HTML5
D) Software outsourcing
E) Multicore processors
Answer: E
Difficulty: Moderate
AACSB: Analytical thinking
LO: 5-4: What are the current computer software platforms and trends?
69) Linux is:
A) primarily concerned with the tasks of end users.
B) designed for specific machines and specific microprocessors.
C) an example of open-source software.
D) especially useful for processing numeric data.
E) poorly suited to power fast computers.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
19
Copyright © 2020 Pearson Education, Inc.
70) Which of the following statements about Linux is not true?
A) It plays a major role in the back office running local area networks.
B) It is available in free versions downloadable from the Internet.
C) It has garnered 20 percent of the server operating system market.
D) Linux applications are embedded in cell phones, smartphones, netbooks, and other handheld
devices.
E) Linux works on all the major hardware platforms.
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
71) Running a Java program on a computer requires:
A) a Java Virtual Machine to be installed on that computer.
B) a Java Virtual Machine to be installed on the server hosting the Java applet.
C) a miniature program to be downloaded to the user's computer.
D) no specialized software, as Java is platform-independent.
E) the Mozilla Firefox browser and no other browsers.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
72) A software program with a graphical user interface for displaying web pages and for
accessing the web and other Internet resources is called a web:
A) service.
B) client.
C) browser.
D) app.
E) beacon.
Answer: C
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
73) Sets of loosely coupled software components that exchange information with each other
using standard web communication standards and languages are referred to as:
A) web services.
B) EAI software.
C) SOA.
D) SOAP.
E) SaaS.
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
20
Copyright © 2020 Pearson Education, Inc.
74) Which of the following is the foundation technology for web services?
A) XML
B) HTML
C) SOAP
D) UDDI
E) SCSI
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
75) Which of the following refers to a set of self-contained services that communicate with each
other to create a working software application?
A) Web services
B) EAI software
C) SOA
D) SOAP
E) Prepackaged software
Answer: C
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
76) Prewritten, commercially available sets of software programs that eliminate the need for a
firm to write its own software programs for certain functions, are referred to as:
A) software packages.
B) mashups.
C) outsourced software.
D) open-source software.
E) service level agreements.
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
77) ________ are created by combining and customizing components from different online
software applications.
A) Apps
B) Web browsers
C) SaaS
D) Web services
E) Web mashups
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
21
Copyright © 2020 Pearson Education, Inc.
78) The practice of contracting custom software development to an outside firm is commonly
referred to as:
A) outsourcing.
B) scaling.
C) service-oriented architecture.
D) application integration.
E) utility computing.
Answer: A
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
79) A formal contract between customers and their service providers that outlines the specific
responsibilities of the service provider and to the customer is called a(n):
A) SOA.
B) SLA.
C) TCO.
D) RFQ.
E) SaaS.
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
80) ________ provides a standard format for data exchange, enabling web services to pass data
from one process to another.
A) HTML
B) HTML5
C) Java
D) Chrome OS
E) XML
Answer: E
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
81) Java software is designed to run only on specific microprocessors and operating systems.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
22
Copyright © 2020 Pearson Education, Inc.
82) Web services can exchange information between two different systems only if the operating
systems and programming languages upon which the systems are based are identical.
Answer: FALSE
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
83) Whereas HTML is limited to describing how data should be presented in the form of Web
pages, XML can perform presentation, communication, and data storage tasks.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
84) Hypertext markup language specifies how text, graphics, video, and sound are placed on a
webpage.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
85) A service-oriented architecture is set of self-contained services that communicate with each
other to create a working software application.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
86) Today, many business firms continue to operate legacy systems because they meet a business
need and would be costly to replace.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-4: What are the current computer software platforms and trends?
23
Copyright © 2020 Pearson Education, Inc.
87) Identify and describe five or more of the current trends in contemporary software platforms.
Answer:
1. Growing use of Linux and open-source software–Open-source software is produced and
maintained by a global community of programmers and is downloadable for free. Linux is a
powerful, resilient open-source operating system that can run on multiple hardware platforms
and is used widely to run Web servers.
2. HTML5–This is the next evolution of HTML which simplifies embedding multimedia, rich
media, and animation in the browser.
3. Cloud-based services–In cloud-based services and software, users rent applications or storage
space from online providers rather than running these applications or themselves or using local
storage.
4. Web services and service-oriented architecture–Web services are loosely coupled software
components based on open web standards that are not product-specific and can work with any
application software and operating system. They can be used as components of Web-based
applications linking the systems of two different organizations or to link disparate systems of a
single company.
5. Software outsourcing–Companies are purchasing their new software applications from
outside sources, including application software packages, by outsourcing custom application
development to an external vendor (that may be offshore), or by renting software services from
an application service provider.
6. Cloud-based services–Companies are leasing infrastructure, hardware, and software from
vendors, paying on a subscription or per-transaction basis.
7. Mashups and apps–Mashups are programs created by combining two or more existing
Internet applications. Apps are small programs developed for mobiles and handhelds, turning
them into more robust computing tools.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-4: What are the current computer software platforms and trends?
88) Define outsourcing and explain some of the computing tasks that are well suited to
outsourcing.
Answer: Outsourcing is the shift of IT infrastructure and systems development to external
vendors. This is a good option for companies without the resources or technical capability to
perform certain computing tasks. Tasks well suited to outsourcing include Web site hosting, Web
design, development of custom software, and software maintenance. More basic tasks such as
data entry and call center operation is often outsourced as well. Outsourcing often requires firms
to enter into a service level agreement (SLA) that defines the specific responsibilities of the
service provider.
Difficulty: Challenging
AACSB: Information technology; Written and oral communication
LO: 5-4: What are the current computer software platforms and trends?
24
Copyright © 2020 Pearson Education, Inc.
89) Which of the following refers to the ability of a computer, product, or system to expand to
serve a larger number of users without breaking down?
A) Modality
B) Scalability
C) Expandability
D) Disintermediation
E) Customizability
Answer: B
Difficulty: Easy
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
90) Hardware and software acquisition costs account for about ________ percent of TCO.
A) 20
B) 40
C) 50
D) 75
E) 90
Answer: A
Difficulty: Moderate
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
91) Which model can be used to analyze the direct and indirect costs to help firms determine the
actual cost of specific technology implementations?
A) Supply and demand
B) Return on investment
C) Breakeven point
D) Cost-benefit analysis
E) Total cost of ownership
Answer: E
Difficulty: Easy
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
92) How would you determine the market demand for your firm's IT services?
A) Perform a TCO analysis
B) Benchmark your services
C) Hold focus groups to assess your services
D) Analyze sales returns on key investments
E) Perform a stress test
Answer: C
Difficulty: Easy
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
25
Copyright © 2020 Pearson Education, Inc.
93) Which of the following is not one of the main six factors to consider when evaluating how
much your firm should spend on IT infrastructure?
A) Your firm's business strategy
B) The IT investments made by competitor firms
C) Market demand for your firm's services
D) Your firm's organizational culture
E) Information technology assessment
Answer: D
Difficulty: Moderate
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
94) The decision to purchase your own IT assets or rent them from external providers is also
referred to as the rent-versus-buy decision.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
95) Scalability refers to the ability of a computer, product, or system to expand to serve a large
number of users without breaking down.
Answer: TRUE
Difficulty: Easy
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
96) TCO refers just to the original cost of purchased technology: both hardware and software.
Answer: FALSE
Difficulty: Easy
AACSB: Information technology
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
97) What is scalability? Why is it essential to the success of the modern business firm?
Answer: Scalability is the ability of the computer, product, or system to expand to survey larger
numbers of users without breaking down. It is important because as firms grow, they can quickly
outgrow their infrastructure. As firms shrink, they can get stuck with excessive infrastructure
purchased in better times. Any modern company must be able to make plans for the future, even
though that future may be different than what was expected. Computer equipment is expensive,
though dropping in price, and budgets must be planned to allow for new purchases, upgrades,
and training. It is generally assumed that a successful company will need more computer
capacity for more people as it follows a path to continued success.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
26
Copyright © 2020 Pearson Education, Inc.
98) A small design agency you are consulting for will be creating client websites and wants to
purchase a web server so they can host the sites themselves. How will you advise them on this
purchase?
Answer: They need to understand total cost of ownership: the costs will go beyond the cost of
the server, but they will also need to purchase the server software and any application software
they will be using. They will also need someone in their IT department to manage and maintain
the computers. They will also incur facilities costs for running the computer. They need to have a
backup plan should the server fail. The design agency will need to add up all the potential costs
and risks. Additionally, they need to prepare for their plan if they need more servers. Will they
eventually have to run and maintain their own server farm? What if one of their clients' sites is
more popular than anticipated and the server has difficulty handling the load? How quickly can
they add servers or processing power? The company should look at colocation, Web hosting
services, and ASPs to see if their needs will be better met this way.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
99) You are starting a market research company with a single business partner and are planning
the hardware and software needs for the two of you. Which factors should play into your
decision of how much to spend on these investments?
Answer: Using the competitive forces model for IT infrastructure investment, the most relevant
factors in this decision are:
• The firm's business strategy. What capabilities will we want to have over the next five years?
• Alignment of IT strategy. How does our IT strategy match up with the business plan?
• IT assessment. What are the current technology levels for the services we are offering and our
business type? We would probably not need to be at the bleeding edge, but not behind the times
either.
• Competitor firm services. What technology-enabled capabilities do our competitors have? We
would want to match services with our competitors.
• Competitor firm IT investments. How much are competitor firms investing in their
technology?
Because this is a startup, one other factor may not play such a large role: that of market demand
for services. However, finding out the market demand for competitor's services may uncover
ways that this new company could have a competitive advantage.
Difficulty: Challenging
AACSB: Analytical thinking
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
27
Copyright © 2020 Pearson Education, Inc.
100) What are the components that must be considered in a TCO analysis?
Answer: TCO cost components include hardware acquisition, which includes the purchase price
of computer hardware equipment, including computers, terminals, storage, and printers; software
acquisition, which includes the purchase or license of software for each user; installation, which
includes the cost to install computers and software; training, which includes the cost to provide
training to information systems specialists and end users; support, which includes the cost to
provide ongoing technical support; maintenance, which includes the cost to upgrade hardware
and software; infrastructure, which includes the cost to acquire, maintain, and support related
infrastructure, such as networks and specialized equipment; downtown, which includes the cost
of lost productivity if hardware or software failures cost the system to be unavailable; and space
and energy, such as real estate and utility costs.
Difficulty: Challenging
AACSB: Application of knowledge; Written and oral communication
LO: 5-5: What are the challenges of managing IT infrastructure and management solutions?
28
Copyright © 2020 Pearson Education, Inc.
Management Information Systems, 14e (Laudon)
Chapter 10 E-Commerce: Digital Markets, Digital Goods
1) What event marked the beginning of e-commerce?
A) The first product sold online.
B) The first domain name registered.
C) The first e-mail sent.
D) The first paid advertisements placed on a Web site.
E) The first product advertised online.
Answer: D
Page Ref: 384
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
2) Based on your reading of the chapter, e-commerce is
A) still in a revolutionary phase.
B) widely accepted by consumers, although technology is still quickly changing.
C) not yet fully accepted by consumers, although much of its driving technology is firmly in
place.
D) well entrenched as a form of modern commerce.
E) declining as users lose interest.
Answer: A
Page Ref: 384-394
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Evaluation in terms of assess
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
3) A marketplace extended beyond traditional boundaries and removed from a temporal and
geographic location is called a(n)
A) exchange.
B) marketspace.
C) online marketplace.
D) e-hub.
E) net marketplace.
Answer: B
Page Ref: 387
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
1
Copyright © 2016 Pearson Education, Inc.
4) Recent developments in e-commerce include all of the following except
A) small businesses continue to flood the e-commerce marketplace.
B) social networking sites become a new platform for e-commerce.
C) Internet-based models of computing, such as smartphone apps.
D) the online demographic of shoppers broadens to match that of ordinary shoppers.
E) social sharing e-commerce sites extend the market creator business model.
Answer: C
Page Ref: 386
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Analysis in terms of examine
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
5) What standards are referred to when discussing universal standards as a unique feature of ecommerce?
A) Internet technology standards
B) common spoken and written languages
C) universal measuring standards
D) universal advertising and media format standards
E) EDI standards
Answer: B
Page Ref: 388
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
6) All of the following are unique features of e-commerce technology, except
A) personalization/customization.
B) interactivity.
C) universality.
D) richness.
E) global reach.
Answer: C
Page Ref: 388
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
2
Copyright © 2016 Pearson Education, Inc.
7) The act of engaging consumers in a dialog that dynamically adjusts the experience to the
individual describes which dimension of e-commerce technology?
A) ubiquity
B) personalization/customization
C) richness
D) interactivity
E) information density
Answer: D
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
8) The integration of video, audio, and text marketing messages into a single marketing message
and consumer experience describes which dimension of e-commerce technology?
A) ubiquity
B) personalization/customization
C) richness
D) interactivity
E) social technology
Answer: C
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
9) The lowered costs of information storage, processing, and communication, along with the
improvement of data quality, has resulted in which unique quality of e-commerce?
A) information density
B) richness
C) customization
D) interactivity
E) global reach
Answer: A
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
3
Copyright © 2016 Pearson Education, Inc.
10) The effort required to locate a suitable product is called
A) price discrimination.
B) search costs.
C) menu costs.
D) shopping costs.
E) location costs.
Answer: B
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
11) Information density refers to the
A) richness—complexity and content—of a message.
B) total amount and quantity of information delivered to consumers by merchants.
C) total amount and quantity of information available to all market participants.
D) amount of information available to reduce price transparency.
E) amount of physical storage space needed to store data about a specific entity, such as a
product or consumer.
Answer: C
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
12) Selling the same goods to different targeted groups at different prices is called
A) cost customization.
B) cost optimization.
C) price gouging.
D) cost personalization.
E) price discrimination.
Answer: E
Page Ref: 389
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
4
Copyright © 2016 Pearson Education, Inc.
13) Information ________ exists when one party in a transaction has more information that is
important for the transaction than the other party.
A) transparency
B) asymmetry
C) complexity
D) discrimination
Answer: B
Page Ref: 389
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
14) Varying a product's price according to the supply situation of the seller is called ________
pricing.
A) menu
B) flexible
C) dynamic
D) asymmetric
E) customized
Answer: C
Page Ref: 391
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
15) Reducing the business process layers in a distribution channel is called
A) disintermediation.
B) BPR.
C) market segmentation.
D) network effects.
E) market transparency.
Answer: A
Page Ref: 391
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
5
Copyright © 2016 Pearson Education, Inc.
16) Digital goods are goods that are
A) produced digitally.
B) sold over digital networks.
C) delivered digitally.
D) used with digital equipment.
E) created with software.
Answer: C
Page Ref: 392
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
17) Compared to digital markets, traditional markets have
A) lower search costs.
B) stronger network effects.
C) higher delayed gratification effects.
D) reduced asymmetry.
E) higher transaction costs.
Answer: E
Page Ref: 392
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Analysis in terms of compare
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
18) Compared to traditional goods, digital goods have
A) greater pricing flexibility.
B) lower marketing costs.
C) higher production costs.
D) higher inventory costs.
E) lower menu costs.
Answer: A
Page Ref: 392
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Analysis in terms of compare
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
6
Copyright © 2016 Pearson Education, Inc.
19) Compared to traditional goods, digital goods incur
A) lower distribution costs.
B) higher marginal costs per unit.
C) equivalent copying costs.
D) similar inventory costs.
E) less disintermediation.
Answer: A
Page Ref: 392
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Analysis in terms of compare
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
20) What is the primary benefit to consumers of disintermediation?
A) faster service
B) lower costs
C) higher quality
D) greater choices
E) None, disintermediation primarily benefits manufacturers.
Answer: B
Page Ref: 391
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
21) E-commerce refers simply to the use of the Internet and the Web to transact business.
Answer: TRUE
Page Ref: 384
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
22) Retail consumer e-commerce is growing at single-digit rates.
Answer: FALSE
Page Ref: 383
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
7
Copyright © 2016 Pearson Education, Inc.
23) The Internet shrinks information asymmetry.
Answer: TRUE
Page Ref: 390
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
24) All previous mass media in modern history, including the printing press, use a broadcast
model where content is created in a central location by experts.
Answer: TRUE
Page Ref: 390
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
25) Disintermediation provides major benefits to the distributor.
Answer: FALSE
Page Ref: 391
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Evaluation in terms of assess
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
26) In general, for digital goods, the marginal cost of producing another unit is about zero.
Answer: TRUE
Page Ref: 392
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
27) Intellectual property refers to all forms of human expression, both tangible and intangible.
Answer: FALSE
Page Ref: 392
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
8
Copyright © 2016 Pearson Education, Inc.
28) Traditional online marketing, such as display ads, is still the majority of all online marketing.
Answer: TRUE
Page Ref: 387
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
29) Information asymmetry exists when there is more information about one product than there
is about a similar product.
Answer: FALSE
Page Ref: 390
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
30) Price transparency refers to the ability of consumers to discover what merchants actually pay
for products.
Answer: FALSE
Page Ref: 389
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
31) Switching costs are the merchants' costs of changing prices.
Answer: FALSE
Page Ref: 391
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
9
Copyright © 2016 Pearson Education, Inc.
32) What is the most profound way in which e-commerce and the Internet have changed the
relationship between companies and their customers? Support your answer.
Answer: Student answers will vary. A sample answer is: The most profound way in which ecommerce and the Internet have changed this relationship is in the shrinking of information
asymmetry. An information asymmetry exists when one party in a transaction has more
information that is important for the transaction than the other party. That information helps
determine their relative bargaining power. In digital markets, consumers and suppliers can "see"
the prices being charged for goods, and in that sense digital markets are said to be more
"transparent" than traditional markets. For example, until auto retailing sites appeared on the
Web, there was a pronounced information asymmetry between auto dealers and customers. Only
the auto dealers knew the manufacturers' prices, and it was difficult for consumers to shop
around for the best price. Auto dealers' profit margins depended on this asymmetry of
information. Today's consumers have access to a legion of Web sites providing competitive
pricing information, and three-fourths of U.S. auto buyers use the Internet to shop around for the
best deal. Thus, the Web has reduced the information asymmetry surrounding an auto purchase.
The Internet has also helped businesses seeking to purchase from other businesses reduce
information asymmetries and locate better prices and terms.
Page Ref: 383-418
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
33) "Knowledge increases exponentially" is a phrase with which we are all familiar. How does
this concept apply to electronic business and the emergence of the digital firm? Support your
contentions.
Answer: Student answers will vary. A sample answer is: The exponential increases of knowledge
refer to shared information. For example, once the concept of a wheel is established, inheritors of
that knowledge do not have to "reinvent the wheel." The Internet is a tool similar to the wheel: it
is based on shared standards and universal tools. The Internet and shared networking
technologies are allowing new techniques for attracting customers and selling customers to be
developed and adapted very quickly. For example, although early Internet retailers had difficulty
setting up secure credit card transactions and payment systems, today there are many systems in
place as vendors step in to create shared tools for doing this. The Internet is fostering shared
knowledge and, as such, propagating ever greater increases in that knowledge.
Page Ref: 383-418
Difficulty: Difficult
AACSB: Written and oral communication
CASE: Synthesis in terms of bringing information together
LO: 10.1: What are the unique features of e-commerce, digital markets, and digital goods?
10
Copyright © 2016 Pearson Education, Inc.
34) Which of the following Internet business models does Amazon.com use?
A) vontent provider
B) portal
C) market creator
D) e-tailer
E) transaction brokder
Answer: D
Page Ref: 395
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
35) eBay is an example of
A) C2C e-commerce.
B) B2B e-commerce.
C) B2C e-commerce.
D) M-commerce.
E) P2P-commerce.
Answer: A
Page Ref: 394
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
36) ________ refers to businesses selling goods and services electronically to individuals.
A) B2C e-commerce
B) Social e-commerce
C) C2C e-commerce
D) Disintermediation
E) M-commerce
Answer: A
Page Ref: 394
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
11
Copyright © 2016 Pearson Education, Inc.
37) ________ uses the community provider Internet business model.
A) iTunes
B) Yahoo
C) eBay
D) Google
E) Twitter
Answer: E
Page Ref: 395
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
38) Transaction brokers
A) generate revenue from advertising or from directing buyers to sellers.
B) save users money and time by processing online sales transactions.
C) provide a digital environment where buyers and sellers can establish prices for products.
D) sell physical products directly to consumers or individual businesses.
E) provide online meeting places where people with similar interests can communicate.
Answer: B
Page Ref: 395
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
39) In which of the following Internet business models does a merchant create an online digital
environment that enables people with like interests to share information?
A) community provider
B) service provider
C) market creator
D) transaction broker
E) portal
Answer: A
Page Ref: 395
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
12
Copyright © 2016 Pearson Education, Inc.
40) Market creators
A) save users money and time by processing online sales transactions.
B) provide a digital environment where buyers and sellers can establish prices for products.
C) create revenue by providing digital content over the Web.
D) sell physical products directly to consumers or individual businesses.
E) generate revenue from advertising or from directing buyers to sellers.
Answer: B
Page Ref: 395
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
41) Which of the following best illustrates the sales revenue model?
A) eBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or she
makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
E) Netflix charges customers a monthly fee for access to its library of movies.
Answer: D
Page Ref: 398
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
42) Which of the following best illustrates the affiliate revenue model?
A) eBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or she
makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
E) Netflix charges customers a monthly fee for access to its library of movies.
Answer: B
Page Ref: 399
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
13
Copyright © 2016 Pearson Education, Inc.
43) Which of the following best illustrates the transaction fee revenue model?
A) eBay receives a small fee from a seller if a seller is successful in selling an item.
B) Epinions receives a fee after steering a customer to a participating Web site where he or she
makes a purchase.
C) Flickr provides basic services for free, but charges a premium for advanced services.
D) Apple accepts micropayments for single music track downloads.
E) Netflix charges customers a monthly fee for access to its library of movies.
Answer: A
Page Ref: 399
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
44) In the ________ revenue models, a firm offers some services for free but charges a
subscription fee for premium services.
A) free/freemium
B) subscription
C) transaction fee
D) affiliate
E) sales
Answer: A
Page Ref: 399
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
45) Content providers use ________ systems to process large amounts of very small monetary
transactions cost-effectively.
A) subscription
B) mobile payment
C) transaction fee
D) micropayment
E) affiliate revenue
Answer: D
Page Ref: 398
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
14
Copyright © 2016 Pearson Education, Inc.
46) An example of the market creator business model is eBay, a C2C auction site.
Answer: TRUE
Page Ref: 395
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
47) An example of the portal business model is Facebook.
Answer: FALSE
Page Ref: 395
Difficulty: Easy
AACSB: Analytical thinking
CASE: Analysis in terms of categorize
LO: 10.2: What are the principal e-commerce business and revenue models?
48) Web personalization is used primarily as a major marketing tool.
Answer: TRUE
Page Ref: 404
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of appraise
LO: 10.2: What are the principal e-commerce business and revenue models?
49) Podcasting allows subscribers to listen to live, streaming radio and other audio content.
Answer: FALSE
Page Ref: 396
Difficulty: Easy
AACSB: Analytical thinking
CASE: Analysis in terms of examine
LO: 10.2: What are the principal e-commerce business and revenue models?
50) In the affiliate revenue model, firms derive revenue by selling information or services
through partner e-commerce sites.
Answer: FALSE
Page Ref: 399
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.2: What are the principal e-commerce business and revenue models?
15
Copyright © 2016 Pearson Education, Inc.
51) List and describe at least five different Internet business models. Which of these models do
you think would be the most risky for a startup business today? Support your answer.
Answer: Internet business models include: e-tailer, transaction broker, market creator, content
provider, community provider, portal and service. The choice of riskiest model will depend on
the individual student. A sample answer is: Today the riskiest model would be a content-provider,
because most, if not all, of the major offline entertainment and content producers such as
television networks and newspapers are online. They would be your competitors, and already
have the means for content creation and distribution in place. All of the other business models do
not have the risk of creating brand new content.
Page Ref: 394-397
Difficulty: Easy
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.2: What are the principal e-commerce business and revenue models?
52) List and describe the three main categories of electronic commerce. Which do you think is
ultimately the most valuable to the individual consumer? Support your answer.
Answer: Business-to-consumer, business-to-business, and consumer-to-consumer. All three are
valuable to the consumer, but in the long run, business-to-business may be the most valuable to
the individual consumer because it will reduce prices and increase both goods and services.
(Other opinions, of course, are supportable.)
Page Ref: 394
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.2: What are the principal e-commerce business and revenue models?
53) What methods could a portal use to generate revenue? Which do you think might be most
successful, and why?
Answer: Advertising, subscriptions, selling collected marketing information, and directing
buyers to sellers could all generate revenue. Student evaluations will vary. A sample answer is: I
would think the most successful method would be through collecting marketing information,
because as a portal that links to large amounts of external information and attracts repeat
customers, the portal would have the opportunity to gather a lot of information about each user.
Page Ref: 394-395
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.2: What are the principal e-commerce business and revenue models?
16
Copyright © 2016 Pearson Education, Inc.
54) You are consulting for Lucky's, a chain of gas stations. What types of e-commerce
opportunities, if any, are relevant to Lucky's? Could Lucky's make use of any Internet business
models for this opportunity?
Answer: Student answers will vary. A sample answer is: In terms of B2B e-commerce, Lucky's
might be able to procure goods over the Internet, use a private industrial network to coordinate
their supply chain with suppliers and manage inventory. Depending on the structure of the
gasoline retail business, industry net marketplaces and exchanges might be of use. In terms of
B2C e-commerce, there are not many opportunities, as it is inefficient to sell gasoline over the
Internet. Lucky's could make sure that its stations are listed in popular location-based mobile
services that help drivers find nearby gas stations.
Page Ref: 383-418
Difficulty: Difficult
AACSB: Written and oral communication
CASE: Synthesis in terms of bringing information together
LO: 10.2: What are the principal e-commerce business and revenue models?
55) ________ describes the concept that a large group of people is better at making good
decisions than a single person.
A) The wisdom of crowds
B) Outsourcing
C) Crowdsourcing
D) Social graphing
E) Social search
Answer: A
Page Ref: 407
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
56) Netflix's public announcement of a reward for a technology solution to its movie
recommendation system is an example of
A) prediction markets.
B) behavioral targeting.
C) long-tail marketing.
D) social shopping.
E) crowdsourcing.
Answer: E
Page Ref: 408
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
17
Copyright © 2016 Pearson Education, Inc.
57) Exposing an individual to ads that are chosen and based on the recorded and analyzed online
behavior of the individual is referred to as
A) clickstream advertising.
B) behavioral targeting.
C) online profiling.
D) long tail marketing.
E) crowdsourcing.
Answer: B
Page Ref: 402
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
58) Which of the following best describes the digital social graph?
A) a person's direct and indirect relationships
B) all of a person's closest digital relationships
C) a mapping of all online social relationships
D) all of the online and offline relationships a person has
E) all of the relationships in an online community
Answer: C
Page Ref: 405
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
59) Which of the following marketing formats is sales oriented, rather than branding oriented or
a mix?
A) lead generation
B) search engine
C) rich media
D) display ads
E) video
Answer: B
Page Ref: 402
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Evaluation in terms of assess
LO: 10.3: How has e-commerce transformed marketing?
18
Copyright © 2016 Pearson Education, Inc.
60) Which of the following social commerce features allows social network sites to gather and
distribute to others information about which products a user likes and dislikes?
A) social sign-on
B) collaborative shopping
C) network notification
D) social search
E) newsfeed
Answer: C
Page Ref: 407
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
61) Which of the following is a marketing format that uses banner ads and pop-ups with
interactive features?
A) search engine ads
B) video ads
C) rich media ads
D) e-mail ads
E) display ads
Answer: E
Page Ref: 402
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
62) The Internet enables ________ marketing, by leveraging the fact that there is always some
demand, however small, for a product.
A) long-tail
B) behavioral
C) crowdsource
D) prediction
E) lead generation
Answer: A
Page Ref: 401
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
19
Copyright © 2016 Pearson Education, Inc.
63) ________ is a peer-to-peer market in which participants bet on the outcomes of current
events, business, or social trends.
A) Crowdsourcing
B) A net marketplace
C) A prediction market
D) A futures auction
E) A private exchange
Answer: C
Page Ref: 408
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
64) What is the difference between personalization and customization, as applied to e-commerce
technologies?
A) Customization is any type of adjustment made to a product by the user; personalization refers
to a business changing a product or service for the user.
B) Personalization is any type of adjustment made to a product by the user; customization refers
to a business changing a product or service for the user.
C) Customization refers to adjusting marketing messages for a consumer; personalization refers
to adjusting a product or service based on a user's preferences.
D) Personalization refers to adjusting marketing messages for a consumer; customization refers
to adjusting a product or service based on a user's preferences.
E) There is no difference, both terms refer to changing a product or communication for the
consumer.
Answer: D
Page Ref: 389-390
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
65) Rich media advertisements are a sales-oriented marketing format.
Answer: FALSE
Page Ref: 402
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Analysis in terms of appraise
LO: 10.3: How has e-commerce transformed marketing?
20
Copyright © 2016 Pearson Education, Inc.
66) Behavioral targeting occurs at two levels: individual Web sites and through ISPs.
Answer: FALSE
Page Ref: 403
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
67) Advertising networks track a user's behavior at thousands of Web sites.
Answer: TRUE
Page Ref: 403
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
68) Viral marketing is like traditional word-of-mouth marketing except that it is spread via online
communities.
Answer: TRUE
Page Ref: 407
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
69) The behavioral targeting of ads results in consumers responding ten times more frequently
than when delivered ads randomly.
Answer: TRUE
Page Ref: 404
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.3: How has e-commerce transformed marketing?
21
Copyright © 2016 Pearson Education, Inc.
70) Describe the use of personalization and customization in e-commerce. What business value
do these techniques have?
Answer: In personalization, merchants can target their marketing messages to specific
individuals by adjusting the message to a person's name, interests, and past purchases. For
example, Amazon.com greets each logged in user with their user name. With customization,
merchants can change the delivered product or service based on a user's preferences or prior
behavior. The Wall Street Journal Online allows you to select the type of news stories you want
to see first and gives you the opportunity to be alerted when certain events happen. The ability of
Internet technology to track customer behavior at Web sites, along with records of purchases and
other behavior, allows merchants to create a detailed profile of a customer. These profiles can be
used to create unique personalized Web pages that display content or ads for products or services
of special interest to each user, improving the customer's experience and creating additional
value. The business value of personalization is reduced marketing costs, as you spend only the
money to target customers that are more likely to be receptive and are more profitable, and
improved sales results, from increased customer response to personalized sites that better serve
their own purposes and shopping needs. Personalization can achieve some of the benefits of
using individual salespeople for dramatically lower costs.
Page Ref: 389-390
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.3: How has e-commerce transformed marketing?
71) You have been hired as a marketing consultant by a law firm in Los Angeles that specializes
in juvenile justice. What ways can you use the Internet as a marketing tool and to advertise the
firm's services?
Answer: Student answers will vary. A sample answer is: For marketing research, you could
advertise on search engines. You could pay for marketing research at relevant portals. You could
also collect customer information from the company's Web site. You could monitor relevant
blogs to see what issues are of concern in juvenile justice, so as to address these concerns in your
advertising campaigns. To advertise, you could advertise on search engine results and at relevant
portals or legal information content providers. If it were feasible, you could create a juvenile
justice portal and blog for the company in order to attract users from whom you could gather
market research as well as promote your services. You might also want to investigate social
network marketing—assuming that your clients might be the best leads for other clients.
Page Ref: 399-408
Difficulty: Difficult
AACSB: Written and oral communication
CASE: Synthesis in terms of bringing information together
LO: 10.3: How has e-commerce transformed marketing?
22
Copyright © 2016 Pearson Education, Inc.
72) Web site tracking software can log the path a customer took through the Web site, the time
spent on the site, and what geographic area, in general, the customer is from, all of which can
help in customer analysis. It can also log the customer's operating system and which browser the
customer is using. How could these last two data items be of interest to a company? Give
examples.
Answer: Student answers will vary, but should include an understanding that customer OS and
browser interact technologically with a Web site and might be relevant in data analysis. An
example is: Customer OSs and browsers could help a company determine what technical
functionalities could be used in the site. For example, if it found out that a significant percentage
of its users are using mobile browsers, they might want to make sure that the Web site is easily
used by various mobile devices. Secondly, this data might be relevant in data mining or other
analysis. For example, a retail clothing company might find that a significant portion of their
most valued customers use an Apple operating system, and from other data analysis know that
Apple users are more likely to purchase cashmere sweaters. Then the company may want to
place a greater emphasis on selling the cashmere sweaters.
Page Ref: 402-405
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Evaluation in terms of assess
LO: 10.3: How has e-commerce transformed marketing?
73) All of the following are activities related to establishing a Web presence except for
A) search.
B) affiliates.
C) apps.
D) newsletters.
E) display.
Answer: D
Page Ref: 417
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
74) EDI is
A) the use of Internet technologies for electronic data transactions.
B) the exchange between two organizations of standard transactions through a network.
C) electronic data invoicing.
D) electronic delivery infrastructure.
E) slowly becoming the norm for B2B communications.
Answer: B
Page Ref: 409
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
23
Copyright © 2016 Pearson Education, Inc.
75) The process of sourcing goods and materials, negotiating with suppliers, paying for goods,
and making delivery arrangements is called
A) e-procurement.
B) SCM.
C) procurement.
D) sourcing.
E) production.
Answer: C
Page Ref: 410
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
76) A secure Web site that links a large firm to its suppliers and other key business partners is
called a(n)
A) e-hub.
B) marketspace.
C) exchange.
D) private industrial network.
E) net marketplace.
Answer: D
Page Ref: 410
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
77) Net marketplaces
A) focus on continuous business process coordination between companies for supply chain
management.
B) are industry owned or operate as independent intermediaries between buyers and sellers.
C) are geared towards short-term spot purchasing.
D) are more relationship oriented than private industrial networks.
E) typically consist of a large firm linking to its suppliers and partners.
Answer: B
Page Ref: 411
Difficulty: Difficult
AACSB: Analytical thinking
CASE: Evaluation in terms of assess
LO: 10.4: How has e-commerce affected business-to-business transactions?
24
Copyright © 2016 Pearson Education, Inc.
78) A third-party Net marketplace that connects many buyers and suppliers for spot purchasing is
called a(n)
A) exchange.
B) vertical market.
C) private exchange.
D) e-hub.
E) private industrial network.
Answer: A
Page Ref: 411
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
79) Goods that are involved in the actual production process are referred to as
A) raw materials.
B) direct goods.
C) purchasing goods.
D) indirect goods.
E) products.
Answer: B
Page Ref: 411
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
80) Which of the following statements about m-commerce is not true?
A) In 2014, m-commerce represented about 19 percent of all e-commerce.
B) M-commerce is the fastest growing form of e-commerce.
C) In 2014, mobile advertising is up over 80% from the previous year.
D) Fifty-five percent of online retailers have m-commerce Web sites.
E) In 2014, the main areas of growth are in online banking and location-based services.
Answer: E
Page Ref: 412
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
25
Copyright © 2016 Pearson Education, Inc.
81) EDI standards that take advantage of network communications have yet to be fully
implemented at the industry level.
Answer: FALSE
Page Ref: 409
Difficulty: Moderate
AACSB: Information technology
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
82) Net marketplaces may either support contractual purchasing based on long-term relationships
with designated suppliers or short-term spot purchasing.
Answer: TRUE
Page Ref: 411
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
83) Exchanges have become one of the most popular types of Net marketplace because they
encourage competitive bidding that drives prices down.
Answer: FALSE
Page Ref: 412
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
84) Indirect goods are not involved firsthand in the production process.
Answer: TRUE
Page Ref: 411
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.4: How has e-commerce affected business-to-business transactions?
26
Copyright © 2016 Pearson Education, Inc.
85) A new social mobile app you are developing allows users to find friends who are logged in
and within a 10-mile radius. This would be categorized as a ________ service.
A) geosocial
B) geoinformation
C) geoadvertising
D) geomapping
E) geolocating
Answer: B
Page Ref: 413
Difficulty: Easy
AACSB: Analytical thinking
CASE: Analysis in terms of appraise
LO: 10.5: What is the role of m-commerce in business and what are the most important mcommerce applications?
86) Geoadvertising sends ads to users based on their
A) GPS locations.
B) home addresses.
C) shopping preferences.
D) web site behaviors.
E) Google Maps settings.
Answer: A
Page Ref: 413
Difficulty: Moderate
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.5: What is the role of m-commerce in business and what are the most important mcommerce applications?
87) Define location-based services and describe the main categories of these services. Which of
the categories do you feel has the most potential in terms of e-commerce revenues, and why?
Answer: Location-based services are services that use GPS mapping services available on
smartphones to deliver value-added services. They include geosocial services, geoadvertising,
and geoinformation services. A geosocial service can tell you where your friends are meeting.
Geoadvertising services can tell you where to find the nearest Italian restaurant, and
geoinformation services can tell you the price of a house you are looking at, or about special
exhibits at a museum you are passing. Student answers as to the most valuable of these services
will vary; an example is: I feel that geoadvertising services have the most potential for profit, as
it is based on a profit-making mechanism: advertising. Geosocial services and geoinformation
services, by themselves, are more content- and communication-oriented.
Page Ref: 412-413
Difficulty: Moderate
AACSB: Written and oral communication
CASE: Analysis in terms of summarize
LO: 10.5: What is the role of m-commerce in business and what are the most important mcommerce applications?
27
Copyright © 2016 Pearson Education, Inc.
88) Which of the following is a milestone for the Web site development phase of building an ecommerce presence?
A) Web mission statement
B) social media plan
C) Web site plan
D) Web presence map
E) functional Web site
Answer: C
Page Ref: 418
Difficulty: Difficult
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.6: What issues must be addressed when building an e-commerce presence?
89) In planning a robust e-commerce presence, you will want to consider the blog platform as
part of your ________ presence.
A) social media
B) e-mail
C) community
D) Web site
E) offline media
Answer: A
Page Ref: 417
Difficulty: Moderate
AACSB: Analytical thinking
CASE: Evaluation in terms of appraise, assess
LO: 10.6: What issues must be addressed when building an e-commerce presence?
90) Which of the following is not one of four types of presence to be considered when building
an E-commerce presence?
A) offline media
B) Web sites
C) social media
D) corporate
E) e-mail
Answer: D
Page Ref: 417
Difficulty: Easy
AACSB: Application of knowledge
CASE: Comprehension
LO: 10.6: What issues must be addressed when building an e-commerce presence?
28
Copyright © 2016 Pearson Education, Inc.
Download