Study Guide (Chapter 1-4) This guide should be used as a reference for capturing main points from the textbook, not a replacement for your thorough study. When focusing on a particular question, also cover the whole paragraph/page to get an overall understanding. 1. The six important business objectives of information technology are new products, services, and business models; customer and supplier intimacy; survival; competitive advantage; operational excellence; and: a. b. c. d. improved flexibility. improved decision making. improved business practices. improved efficiency. 2. Verizon’s implementation of a Web-based digital dashboard to provide managers with realtime information such as customer complaints is an example of: a. b. c. d. improved flexibility. improved decision making. improved efficiency. customer and supplier intimacy. 3. Order data for baseball tickets and bar code data are examples of: a. b. c. d. raw input. raw output. customer and product data. sales information. 4. The average number of tickets sold daily online is an example of: a. b. c. d. input. raw data. meaningful information. output. 5. Converting raw data into a more meaningful form is called: a. b. c. d. capturing. processing. organizing. feedback. 6. Networking and telecommunications technologies, along with computer hardware, software, data management technology, and the people required to run and manage them, constitute an organization’s: a. b. c. d. data management environment. networked environment. IT infrastructure. information system. 7. An example of a business using information systems for customer and supplier intimacy is: a. b. c. d. Wal-Mart’s RetailLink system. the Mandarin Oriental hotel’s customer-preference tracking system. Verizon’s Web-based digital dashboard. Apple Inc.’s iPod. 8. Disciplines that contribute to the technical approach to information systems are: a. b. c. d. computer science, engineering, and networking. operations research, management science, and computer science. engineering, utilization management, and computer science. management science, computer science, and engineering. 9. Key corporate assets are: a. b. c. d. intellectual property, core competencies, and financial and human assets. production technologies and business processes for sales, marketing, and finance. knowledge and the firm’s tangible assets, such as goods or services. time and knowledge. 10. Overproduction or underproduction of goods and services, misallocation of resources, and poor response times are the results of a firm’s having: a. b. c. d. poor relationships with suppliers. poor relationships with customers. inadequate information. surplus of information. 11. Which of the following would not be used as an input for an information system? a. b. c. d. Digital dashboard Handheld computer Bar-code scanner Cell phone 12. Engineers, scientists, or architects, who design new products or services for a firm, belong to which level of a business hierarchy? a. b. c. d. Middle management Production workers Knowledge workers Data workers ---------------13. Kia’s difficulties in getting a complete picture of defects in their cars illustrates: a. b. c. d. the difficulties in creating accurate tracking systems. the challenges posed by having multiple information systems that are not linked. the difficulties in complying with government regulations. the compromises made in drawing accurate reports from poorly planned information systems. 14. Which of the following is a cross-functional business process? a. b. c. d. Hiring an employee Identifying a customer Fulfilling a customer order Creating an invoice 15. Market research is an activity associated with the: a. b. c. d. finance and accounting function. human resources function. manufacturing and production function. sales and marketing function. 16. Equipment scheduling and facilities maintenance are functions of: a. b. c. d. finance and accounting systems. human resources systems. manufacturing and production systems. sales and marketing systems. 17. The total elapsed time, from the beginning of a business process to the end of the process, is called: a. b. c. d. completion time. requisition-to-pay. fulfillment. cycle time. 18. To monitor the status of internal operations and the firm’s relations with the external environment, managers need _________ systems a. b. c. d. decision-support knowledge transaction processing management information 19. These systems are typically a major source of data for other systems: a. b. c. d. transaction processing systems. management information systems. executive support systems. decision-support systems. 20. These systems are especially suited to situations in which the procedure for arriving at a solution may not be fully predefined in advance: a. b. c. d. management information systems. transaction processing systems. decision-support systems. knowledge management systems. 21. Executive support systems are information systems that support the: a. b. c. d. long-range planning activities of senior management. knowledge and data workers in an organization. decision-making and administrative activities of middle managers. day-to-day processes of production. 22. Many hospitals are described in the BioSense case study as being reluctant to implement BioSense. The organizational challenges that dissuade some hospitals from using the BioSense program include: a. b. c. d. the incompatibility of the hospital’s information systems to the BioSense system. the costs of standardizing information. concerns regarding responsibility for managing a pandemic. all of the above. 23. These systems are designed to support organization-wide process coordination and integration. a. b. c. d. Decision-support systems Management information systems CRM Enterprise applications 24. _______________________ uses a set of integrated applications to address all aspects of the customer relationship. a. b. c. d. CRM MIS CLE CLU 25. ___________________________ is the process that integrates supplier, manufacturer, distributor, and customer logistics processes. a. b. c. d. Collaborative distribution Supply-chain management Reverse logistics Enterprise planning 26. Which types of systems consolidate the relevant knowledge and experience in the firm to make it available to improve business processes and management decision making? a. b. c. d. TPS Extranets KMS CRM 27. Buying or selling goods over the Internet is called: a. b. c. d. e-commerce. e-business. an intranet. an extranet. 28. The use of digital technology and the Internet to execute the major business processes in the enterprise is called: a. b. c. d. e-commerce. e-business. enterprise applications. MIS. 29. The principal liaison between the information systems groups and the rest of the organization is a(n): a. b. c. d. programmer. information systems manager. systems analyst. CTO. 30. A __________ is a senior manager who oversees the use of IT in the firm. a. b. c. d. CEO CFO CIO CTO 31. You work for a highly successful advertiser that is just about to expand nationally. Of utmost importance will be finding a way to store and disseminate their client’s constantly updating branding and style guides, which include multiple image files and text documents, to all of their branches. What system will best serve these needs? a. b. c. d. An intranet with KMS capabilities An extranet with KMS capabilities A TPS with KMS capabilities A sales and marketing information system ----------32. Business processes are collections of: a. b. c. d. informal practices and behaviors. formalized and documented practices. routines. rights and privileges. 33. Amazon’s use of the Internet as a platform to sell books illustrates a tactical use of information services for: a. b. c. d. low-cost leadership. product differentiation. focusing on market niche. strengthening customer intimacy. 34. The four major types of competitive strategy are: a. b. c. d. low-cost leadership; substitute products and services; customers; and suppliers. low-cost leadership; product differentiation; focus on market niche; and customer and supplier intimacy. new market entrants; substitute products and services; customers; and suppliers. low-cost leadership; new market entrants; product differentiation; and focus on market niche. 35. You are consulting for a beverage distributor who is interested in determining the benefits it could achieve from implementing new information systems. What will you advise as the first step? a. b. c. d. Identify the business ecosystem the distributor is in. Implement a strategic transition to the new system. Perform a strategic systems analysis. Benchmark existing systems. 36. The ______________________ model is used to describe the interaction of external forces that affect an organization’s strategy and ability to compete. a. b. c. d. network economics competitive forces competitive advantage demand control 37. Which of the following is not one of the competitive forces? a. b. c. d. Suppliers Other competitors External environment Customers 38. Which of the following industries has a low barrier to entry? a. b. c. d. Automotive Computer chip Restaurant Airline 39. Wal-Mart’s continuous replenishment system allows it to: a. b. c. d. provide mass customization. provide an efficient customer response system. strengthen customer intimacy. achieve economy of scale. 40. When a firm provides a specialized product or service for a narrow target market better than competitors, they are using a: a. b. c. d. product differentiation strategy. market niche strategy. mass customization strategy. process efficiency strategy. 41. An information system can enable a company to focus on a market niche through: a. b. c. d. complex trend forecasting. tailoring products to the client. intensive product trend analysis. intensive customer data analysis. 42. Hilton Hotels’ use of customer information software to identify the most profitable customers to direct services to is an example of using information systems to: a. strengthen customer intimacy. b. c. d. differentiate their service. focus on market niche. increase efficiency. 43. Which of the four generic strategies to combat competitive forces did 7-Eleven implement? a. b. c. d. Low cost leadership Focus on market niche Customer and supplier intimacy Product differentiation 44. To what competitive force did the printed encyclopedia industry succumb? a. b. c. d. Positioning and rivalry among competitors Low cost of entry Substitute products or services Customer’s bargaining power 45. Internet technology: a. b. c. d. makes it easy for rivals to compete on price alone. imposes a significant cost of entry, due to infrastructure requirements. increases the difference between competitors because of the wide availability of information. makes it easy to sustain operational advantages. 46. The Internet raises the bargaining power of customers by: a. b. c. d. creating new opportunities for building loyal customer bases. making more products available. making information available to everyone. lowering transaction costs. 47. The most successful solutions or methods for achieving a business objective are called: a. b. c. d. value activities. best processes. core competencies. best practices. 48. An example of synergy in business is: a. b. c. d. Amazon’s use of the Internet to sell books. JP Morgan Chase’s merger with Bank One Corporation, which provided JP Morgan with a network of retail branches in new regions. Blockbuster combining traditional video rental with online video rental. Wal-Mart’s order entry and inventory management system to coordinate with suppliers. 49. The more any given resource is applied to production, the lower the marginal gain in output, until a point is reached where the additional inputs produce no additional output. This is referred to as: a. b. c. d. the point of no return. the law of diminishing returns. supply and demand. network inelasticity. 50. Which competitive force best categorizes the threat Netflix posed to Blockbuster? a. b. c. d. Rivalry among traditional competitors Threat of new market entrants Substitute products and services Bargaining power of customers 51. Blockbuster’s implementation of online movie rental is an example of using information technology to enhance which part of the value chain? a. b. c. d. Inbound logistics Operations Sales and marketing Procurement 52. The emergence, for Amazon.com, of new competitors in the sphere of online shopping illustrates what disadvantage posed by the use of information systems to achieve competitive advantage? a. b. c. d. Law of diminishing returns Internet technologies are universal, and therefore usable by all companies. Internet shopping produces cost transparency. The Internet enables the production or sales of substitute products or services. -------------53. Which ethical issues will be most central if your career is in finance and accounting? a. b. c. d. Protecting information systems from fraud and abuse Enforcing corporate ethics policies Responsibility regarding data accuracy and quality Privacy issues concerning customer data 54. The four key technical trends responsible for current ethical stresses related to information technology are: a. b. c. d. doubling of computer power every 18 months, data analysis advances, networking advances, the Internet. doubling of computer power every 18 months, declining data storage costs, data analysis advances, lack of international standards for data protection. doubling of computer power every 18 months, declining data storage costs, data analysis advances, networking advances and the Internet. doubling of computer power every 18 months, declining data storage costs, data analysis advances, ease in file sharing and copying. 55. In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of: a. b. c. d. property rights and obligations. system quality. accountability and control. information rights and obligations. 56. The use of computers to combine data from multiple sources and create electronic dossiers of detailed information on individuals is called: a. b. c. d. profiling. spyware. spamming. targeting. 57. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called: a. b. c. d. due process. accountability. courts of appeal. judicial system. 58. Accepting the potential costs, duties, and obligations for the decisions you make is referred to as: a. b. c. d. responsibility. accountability. liability. due process. 59. Immanuel Kant’s Categorical Imperative states that: a. b. c. d. if an action cannot be taken repeatedly, then it is not right to be taken at any time. one should take the action that produces the least harm or incurs the least cost. one can put values in rank order and understand the consequences of various courses of action. if an action is not right for everyone to take, it is not right for anyone to take. 60. A colleague of yours frequently takes small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? a. b. c. d. Kant’s Categorical Imperative The Golden Rule Descartes’ Rule of Change The “No free lunch” rule 61. The ethical “no free lunch” rule states that: a. b. c. d. if an action cannot be taken repeatedly, then it is not right to be taken at any time. one should take the action that produces the least harm or incurs the least cost. one can put values in rank order and understand the consequences of various courses of action. everything is owned by someone else, and that the creator wants compensation for this work. 62 The Federal Trade Commission Fair Information Practice principle of Notice/Awareness states that: a. b. c. d. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. there is a mechanism in place to enforce FIP principles. Web sites must disclose their information practices before collecting data. 63 European privacy protection is _________________ than in the United States. a. b. c. d. less far-reaching less liable to laws much less stringent much more stringent 64 When a cookie is created during a Web site visit, it is stored: a. b. c. d. on the Web site computer. on the visitor’s computer. on the ISP’s computer. in a Web directory. 65 The P3P standard is concerned with protecting privacy by: a. b. c. d. controlling pop-up ads based on user profiles and preventing ads from collecting or sending information. allowing users to surf the Web anonymously. scrambling data so that it can’t be read. blocking or limiting cookies. 66.Intellectual property can best be described as: a. b. c. d. intangible property created by individuals or corporations. unique creative work or ideas. tangible property created from a unique idea. the manifestation of an intangible idea. 67 The limitation of trade secret protection is that although virtually all software programs of any complexity contain unique elements of some sort, it is difficult to prevent the ideas in the work from falling into the public domain when: a. b. c. d. the software is released. the software is open source. the software is widely distributed. a new version of the software is released. 68 What legal mechanism protects the owners of intellectual property from having their work copied by others? a. b. c. d. Patent protection Intellectual property law Copyright Fair Use Doctrine 69.“Look and feel” copyright infringement lawsuits are concerned with: a. b. c. d. the distinction between tangible and intangible ideas. the distinction between an idea and its expression. copying graphical elements of a product. copying creative elements of a product. 70.One of the difficulties of patent protection is: a. b. c. d. that only the underlying ideas are protected. digital media cannot be patented. assuring protection against theft. the years of waiting to receive it. 71.The “do anything anywhere” computing environment can: a. b. c. d. make work environments much more pleasant. create economies of efficiency. centralize power at corporate headquarters. blur the traditional boundaries between work and family time. 72.The practice of spamming has been growing because: a. b. c. d. it is unregulated. it is good advertising practice and brings in many new customers. it helps pay for the Internet. it is so inexpensive and can reach so many people. 73. The chapter’s case study on the effect of Internet use on school-age children associates a higher use of the Internet with: a. b. c. d. lower socialization and interpersonal communications. increased meaningful relationships. increased exposure to advertising. development of a wider variety of meaningful relationships. 74. CVS refers to: a. b. c. d. eyestrain related to computer display screen use. computer virus syndrome. wrist injuries brought about by incorrect hand position when using a keyboard. cardiovascular stress induced by technology. 75. Which of the following is stress induced by computer use, and its symptoms include aggravation, hostility toward humans, impatience, and enervation? a. b. c. d. Computer stress CVS Carpal tunnel syndrome Technostress