Management Information Systems: Managing the Digital Firm
BAM 509
Management Information Systems
Twelfth Edition, 2012
ISBN-10: 0-13-214285-6
Authors:
Kenneth C. Laudon, Jane P. Laudon
Publisher:
Pearson Prentice Hall
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21489);(21498,21489)posrelh0posrelv0pib
Multiple Choice Questions (Enter your answers on the enclosed answer sheet)
1. The three activities in an information system that produce the information organizations use to
control operations are:
a. input, output, and feedback.
b. input, processing, and output.
c. data analysis, processi ng, and feed back.
d. information retrieval, research, and analysis.
2. Converting raw data into a more meaningful form is called:
a. processi ng.
b. organizing.
c. capturing.
d. feedback.
3. The fundamental set of assumptions, values, and ways of doing things that has been accepted
by most of a company’s members is called its:
a. atmosphere.
b. environment.
c. culture.
d. values.
4. The hardware and software used to transfer data in an organization is called:
a. networking and telecommunications technology.
b. data management technology.
c. networking and data management technology.
d. data and telecommunications technology.
5. Networking and telecommunications technologies, along with computer hardware, software,
data management technology, and the people required to run and manage them, constitute an
organization’s:
a. networked environment.
b. data management environment.
c. information system.
d. IT infrastructure.
3
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21500);(21500,21500)posrelh0posrelv0pib
6. An example of a business using information systems for customer and supplier intimacy is:
a. Wal-Mart’s RetailLink system.
b. the Mandarin Oriental hotel’s customer-preference tracking system.
c. Apple Inc.’s iPod.
d. Verizon’s Web-based digital dashboard.
7. A corporation that funds a political action committee, which in turn promotes and funds a
political candidate who agrees with the values of that corporation, could be seen as investing in
which main category of complementary assets?
a. Social
b. Organizational
c. Governmental
d. Managerial
8. Apple Computer dominates the online legal music sales industry primarily because of a failure
of recording label companies to:
a. modernize their information value chain.
b. adopt a new business model.
c. invest in technology.
d. invest in complementary assets.
9. Disciplines that contribute to the technical approach to information systems are:
a. engineering, utilization management, and computer science.
b. management science, computer science, and engineering.
c. computer science, engineering, and networking.
d. operations research, management science, and computer science.
10. Which field of study focuses on both a behavioral and technical understanding of information
systems?
a. Management information systems
b. Economics
c. Operations research
d. Sociology
11. Identifying customers is a responsibility of the function.
a. finance and accounting
b. sales and marketing
c. manufacturing and production
d. human resources
4
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21484);(21498,21484)posrelh0posrelv0pib
12. All of the following statements regarding Lotus Notes are true except for:
a. It began as an e-mail and messaging client.
b. It is the most widely used collaboration tool at Fortune 1000 companies.
c. It provides tools for e-mail, calendars, help desk, CRM, blogs, and wikis.
d. Firmwide installations at a large company require specialized servers and may cost
millions of dollars per year.
13. Which type of system would you use to determine what trends in your supplier’s industry will
affect your firm the most in five years?
a. ESS
b. DSS
c. MIS
d. TPS
14. What is the most important function of an enterprise application?
a. Enabling a company to work collaboratively with customers and suppliers
b. Enabl i ng cost-effective e-busi ness processes
c. Increasing speed of communicating
d. Enabling business functions and departments to share information
15. The point-of-sale Pulse system used by Domino’s to maintain consistent and efficient
management functions in its restaurants is best categorized as which type of system?
a. DSS
b. CRM
c. TPS
d. more than one of the above
16. In Domi no’s upgraded Pulse Evol ution system, it incorporated a Pizza Tracker functional ity
that shows the progression of individual pizza orders. This is an example of using information
systems to achieve which business objective?
a. Improved decision making
b. Operational excellence
c. Survival
d. Customer and supplier intimacy
5
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21494);(21500,21494)posrelh0posrelv0pib
17. The four major enterprise appl ications are:
a. SCMs, CRMs, DSSs, and KMSs.
b. enterprise systems, SCMs, CRMs, and KMSs.
c. enterprise systems, SCMs, DSSs, and CRMs.
d. SCMs, CRMs, ESSs, and KMSs.
18. You are planning the launch of your new company, an application service provider that
provides an online timesheet and project tracking application. To best communicate with and
manage your relationship with your users, you would want to implement atn).
a. CMS.
b. KMS.
c. intranet.
d. extra n et.
19. Which of the following types of system helps expedite the flow of information between the firm
and its suppliers and customers?
a. KMS
b. extra net
c. intranet
d. TPS
20. The use of digital technology and the Internet to execute the major business processes in the
enterprise is called:
a. enterprise applications.
b. e-commerce.
c. MIS.
d. e-business.
21. The CPO is responsi ble for:
a. overseeing the use of information technology in the firm.
b. making better use of existing knowledge in organizational and management processes.
c. enforcing the firm’s information security policy.
d. ensuring that the company complies with existing data privacy laws.
22. Wh ich of the followi ng is not one of the fifteen categories of collaborative software tools?
a. Event scheduling
b. White boarding
c. File sharing
d. Extranets
6
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21484);(21498,21484)posrelh0posrelv0pib
23. As discussed in the chapter opening case, which of the four generic strategies did Verizon
employ to combat the competition offered by AT&T?
a. Customer and supplier intimacy
b. Product differentiation
c. Focus on market niche
d. Low-cost leadership
24. How does the technical view of organizations fall short of understanding the full impacts of
information systems in a firm?
a. It sees the organization as a social structure similar to a machine.
b. It sees information systems as a way to rearrange the inputs and outputs of the
organ ization.
c. It sees the inputs and outputs, labor and capital, as being infinitely malleable.
d. It sees capital and labor as primary production factors.
25. According to the definition of organizations, an organization is seen as a means by
which primary production factors are transformed into outputs consumed by the environment.
a. microeconomic
b. behavioral
c. sociotechnical
d. macroeconomic
26. All of the following are major features of organizations that impact the use of information
systems EXCEPT for:
a. goals.
b. environments.
c. agency costs.
d. busi ness processes.
27. Business processes are collections of:
a. routines.
b. formalized and documented practices.
c. informal practices and behaviors.
d. rights and privi leges.
28. According to Leavitt’s model of organizational resistance, the four components that must be
changed in an organization in order to successfully implement a new information system are:
a. tasks, technology, people, and structure.
b. technology, people, culture, and structure.
c. organization, culture, management, and environment
d. environment, organization, structure, tasks.
7
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21489);(21500,21489)posrelh0posrelv0pib
29. Amazon’s use of the Internet as a platform to sell books more efficiently than traditional
bookstores illustrates which type of competitive strategy:
a. marketi ng effectiveness.
b. strengthening supplier intimacy.
c. focusi ng on market niche.
d. low-cost leadership.
30. Hilton Hotels’ use of customer information software to identify the most profitable customers
to direct services to is an example of using information systems to:
a. strengthen customer intimacy.
b. differentiate their service.
c. increase efficiency.
d. focus on market niche.
31. An example of synergy in business is:
a. Blockbuster combining traditional video rental with online video rental.
b. Wal-Mart’s order entry and inventory management system to coordinate with suppliers.
c. Amazon’s use of the Internet to sell books.
d. JP Morgan Chase’s mergers with other banks that provided JP Morgan with a network
of retail branches in new regions.
32. A virtual company:
a. uses Internet technology to maintain a networked community of users.
b. uses Internet technology to maintain a virtual storefront.
c. provides entirely Internet-driven services, or virtual products.
d. uses the capabilities of other companies without being physically tied to those
companies.
33. Which of the following best describes how new information systems result in legal gray areas?
a. They work with networked, electronic data, which are more difficult to control than
information stored man ually.
b. They are implemented by technicians rather than managers.
c. They result in new situations that are not covered by old laws.
d. They are created from sets of logical and technological rules rather than social or
organ izational mores.
34. Which of the five moral dimensions of the information age do the central business activities of
ChoicePoint raise?
a. System quality
b. Property rights and obi igations
c. I nformation rights and obi igations
d. Accountability and control
8
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21489);(21498,21489)posrelh0posrelv0pib
35. The feature of social institutions that means mechanisms are in place to determine
responsibility for an action is called:
a. the judicial system.
b. the courts of appeal.
c. due process.
d. accountability.
36. Which of the following is not one of the five steps discussed in the chapter as a process for
analyzing an ethical issue?
a. Identify the stakeholders.
b. Identify and clearly describe the facts.
c. Assign responsibility.
d. Identify the options you can reasonably take.
37. The Federal Trade Commission FIP principle of Notice/Awareness states that:
a. data collectors must take responsible steps to assure that consumer information is
accurate and secure from unauthorized use.
b. customers must be allowed to choose how their information will be used for secondary
purposes other than the supporting transaction.
c. Web sites must disclose their information practices before collecting data.
d. there is a mechanism in place to enforce FIP principles.
38. European privacy protection is than in the United States.
a. much more stringent
b. less liable to laws
c. less far-reaching
d. much less stringent
39. What legal mechanism protects the owners of intellectual property from having their work
copied by others?
a. Patent protection
b. Fair use doctrine
c. Intellectual property law
d. Copyright law
40. Two of the three principal sources of poor system performance are:
a. hardware or facility failures and malware.
b. software bugs and errors and outdated standards.
c. hardware or facility failures and poor input data quality.
d. poor input data quality and insufficient integration with legacy systems.
9
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21484);(21500,21484)posrelh0posrelv0pib
41. CVS refers to:
a. eyestrain related to computer display screen use.
b. wrist injuries brought about by incorrect hand position when using a keyboard.
c. carpal vision syndrome.
d. stress induced by technology.
42. Which of the following is NOT an IT infrastructure service component?
a. Physical facility management to manage the facilities housing physical components
b. Computing platforms to provide a coherent digital environment
c. IT management services to plan and develop the infrastructure and provide
project management
d. Operating system software
43. In a multi-tiered network:
a. processing is split between clients and servers.
b. processing is handled by multiple, geographically remote clients.
c. the work of the entire network is centralized.
d. the work of the entire network is balanced over several levels of servers.
44. unleash powerful economies of scale and result in declines in manufactured
computer products.
a. CI ientlserver tech nologies
b. I nternet and web technologies
c. Technology standards
d. Linux and open-source software
45. A SAN is a network.
a. server area
b. service-oriented arch itecture
c. scalable architecture
d. storage area
46. The leading networking hardware providers include:
a. Dell, HP/Compaq, and IBM.
b. IBM, Oracle, and Sun.
c. Cisco, Alcatel-Lucent, and Nortel.
d. Seagate, Maxtor, and Western Digital.
10
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21484);(21498,21484)posrelh0posrelv0pib
47. Which of the following is NOT an example of the emerging mobile computing platforms?
a. netbooks
b. CRM
c. cell phones
d. the Kindle
48. Linux is:
a. an example of open-source software.
b. especially useful for processing numeric data.
c. designed for specific machines and specific microprocessors.
d. primarily concerned with the tasks of end users.
49. What is the foundation technology for Web services?
a. HTML
b. UDDI
c. SOAP
d. XML
50. Which of the following is NOT one of the main six factors to consider when evaluating how
much your firm should spend on IT infrastructure?
a. Your firm’s organizational culture
b. Your firm’s business strategy
c. Market demand for your firm’s services
d. The IT investments made by competitor firms
51. Which of the following non-digital data storage items is most similar to a database?
a. Cash register receipt
b. Library card catalog
c. List of sales totals on a spreadsheet
d. Doctor’s office invoice
52. DBMS for midrange computers include all of the following EXCEPT:
a. DB2.
b. Microsoft SQL Server.
c. Oracle.
d. Microsoft Access.
11
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21489);(21500,21489)posrelh0posrelv0pib
53. An automated or manual file that stores information about data elements and data
characteristics such as usage, physical representation, ownership, authorization, and security
is the:
a. data definition diagram.
b. data dictionary.
c. entity-relationship diagram.
d. relationship dictionary.
54. The most prominent data manipulation language today is:
a. Access.
b. SOL.
c. Crystal Reports.
d.OB2.
55. OBMSs typically include report-generating tools in order to:
a. retrieve and display data.
b. display data in an easier-to-read format.
c. perform predictive analysis.
d. display data in graphs.
56. Which of the following is not one of the techniques used in Web mining?
a. User mining
b. Content mining
c. Usage mining
d. Structure mining
57. A data warehouse is composed of:
a. historic and current internal data.
b. historical data from legacy systems.
c. internal and external data sources.
d. current data.
58. tools are used to analyze large unstructured data sets, such as e-mail, memos,
survey responses, etc., to discover patterns and relationships.
a. Text mining
b.OLAP
c. Web content mining
d. Web mining
12
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21489);(21498,21489)posrelh0posrelv0pib
59. The special organizational function whose responsibilities include the technical and
operational aspects of managing data, including physical database design and maintenance,
is called:
a. database administration.
b. data auditing.
c. information policy administration.
d. data administration.
60. In TCP/IP, IP is responsible for:
a. disassembling and reassembling of packets during transmission.
b. movi ng packets over the network.
c. establishing an Internet connection between two computers.
d. sequencing the transfer of packets.
61. Which signal types are represented by a continuous waveform?
a. Laser
b. Optical
c. Analog
d. Digital
62. All network components connect to a single hub in a topology.
a. domain
b. peer-to-peer
c. bus
d. star
63. A network that covers broad geographical regions is most commonly referred to as atn).
a. intranet.
b. local area network.
c. wide area network.
d. peer-to-peer network.
64. Passive RFID tags:
a. are used in automated toll-collection systems.
b. enable data to be rewritten and modified.
c. have their own power source.
d. have a range of several feet.
13
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21484);(21500,21484)posrelh0posrelv0pib
65. Inputting data into a poorly programmed Web form in order to disrupt a company’s systems
and networks is called:
a. key logging.
b. a Trojan horse.
c. a DDoS attack.
d. an SQL injection attack.
66. The I nternet poses specific security problems because:
a. Internet data is not run over secure lines.
b. it changes so rapidly.
c. Internet standards are universal.
d. it was designed to be easily accessible.
67. An independent computer program that copies itself from one computer to another over a
network is called a:
a. Trojan horse.
b. worm.
c. pest.
d. bug.
68. Using numerous computers to inundate and overwhelm the network from numerous launch
points is called a attack.
a. phishing
b.DDoS
c. SQL injection
d. DoS
69. The Gramm-Leach-Bliley Act:
a. specifies best practices in information systems security and control.
b. outlines medical security and privacy rules.
c. requires financial institutions to ensure the security of customer data.
d. imposes responsibility on companies and management to safeguard the accuracy of
financial information.
70. The most common type of electronic evidence is:
a. voice mail.
b. instant messages.
c. spreadsheets.
d. e-mail.
14
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21484);(21498,21484)posrelh0posrelv0pib
7l. Rigorous password systems:
a. are one of the most effective security tools.
b. may hinder employee productivity.
c. are often disregarded by employees.
d. are costly to implement.
72. Why is overstocking warehouses not an effective solution for a problem of low availability?
a. It increases inventory costs.
b. It increases sales costs.
c. It does not speed product time to market.
d. It is an inefficient use of raw materials.
73. Customer relationship management systems typically provide software and online tools for
sales, customer service, and:
a. account management.
b. marketi ng.
c. advertising.
d. public relations.
74. Customer service modules in CRM systems provide tools for:
a. managing sales prospect and contact information.
b. capturing prospect and customer data.
c. identifying profitable and unprofitable customers.
d. assigning and managing customer service requests.
75. Which of the following is an important capability for sales processes that is found in most
major CRM software products?
a. Returns management
b. Events management
c. Channel promotions management
d. Lead management
76. Analytical CRM applications:
a. provide consolidated data for operational CRM applications.
b. provide customer-facing applications.
c. are based on data warehouses consol idated from operational CR M appl ications.
d. include tools for marketing automation.
15
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21484);(21500,21484)posrelh0posrelv0pib
77. How are the Internet and e-commerce causing severe disruption to the existing advertising
business model?
a. New methods of advertising, such as blog advertising, are emerging.
b. Ties between customer and businesses are being rethought.
c. Technology players such as Yahoo! seek to dominate online advertising and expand into
offl i ne ad brokerage.
d. The market entry costs for online advertising services are extremely low.
78. I nformation density refers to the:
a. total amount and quality of information available to all market participants.
b. total amount and quantity of information delivered to consumers by merchants.
c. richness, complexity and content of a message.
d. amount of information available to reduce price transparency.
79. Digital goods are goods that are:
a. delivered digitally.
b. sold over digital networks.
c. used with digital equipment.
d. produced digitally.
80. In a phenomenon called , some argue that large numbers of people can make better
decisions about a wide range of topics or products than a single person or even a small
committee of experts.
a. crowdsourcing
b. the wisdom of crowds
c. outsourci ng
d. social networki ng
81. Netflix’s public announcement of a reward for a technology solution to its movie
recommendation system is an example of:
a. crowdsourcing.
b. behavioral targeting.
c. long-tail marketing.
d. prediction markets.
82. In the United States, m-commerce:
a. now represents a major fraction of total e-commerce transactions.
b. is still in its infancy.
c. is growing slowly.
d. has become widely adopted.
16
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21489);(21498,21489)posrelh0posrelv0pib
83. What type of knowledge management system did Canadian Tire implement in order to improve
the communications with dealers?
a. Knowledge network system
b. Digital asset management system
c. Learning management system
d. Content management system
84. Changing organizational behavior by sensing and responding to new experience and
knowledge is called:
a. organ izational learn ing.
b. change management.
c. the knowledge value chain.
d. knowledge networking.
85. Fuzzy logic is a type of:
a. business intelligence.
b. intelligent technique.
c. neural network.
d. data mining.
86. Once a knowledge taxonomy is developed, documents are all with the proper
classification.
a. tagged
b. referenced
c. linked
d. tupled
87. An inference engine is:
a. a strategy for searching the rule base in case-based reasoning.
b. a strategy used to search through the rule base in an expert system by forward chaining
or backward chaining.
c. a method of organizing expert system knowledge into chunks.
d. the programming environment of an expert system.
88. The type of decision that can made by following a definite procedure is called atn) _
decision.
a. structured
b. semistructured
c. procedural
d. unstructured
17
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21500,0);(0,0);(0,21489);(21500,21489)posrelh0posrelv0pib
89. As discussed in the chapter text, the three main reasons that investments in information
technology do not always produce positive results are:
a. information qual ity, information integrity, and information accuracy.
b. management support, technical logistics, and user compliance.
c. organization, environment, culture.
d. information quality, organizational culture, and management filters.
90. Which of the following is a disadvantage of high-velocity, automated decision-making
systems?
a. Inability to handle structured decisions
b. I nabi I ity to hand led semi-structured decisions
c. Inability to handle high volumes of decisions
d. Inability to control themselves and respond to new environments
91. The information system used by Caesar’s Entertai nment, which combi nes data from internal
TPS with information from financial systems and external sources to deliver reports such as
profit-loss statements, impact analyses, is an example of:
a. CDSS.
b. MIS.
c. DSS.
d. ESS.
92. are visual tools for presenting performance data in a BI system.
a. Scenarios and models
b. Reports and the drill-down feature
c. Paramaterized reports
d. Dashboards and scorecards
93. The four kinds of structural organizational change enabled by IT, in order from least to most
risky, are:
a. rationalization, automation, reengineering, and paradigm shift.
b. automation, redesigning, restructuring, and paradigm shift.
c. automation, rationalization, reengineering, and paradigm shift.
d. rationalization, automation, reengineering, and redesigning.
94. What is the greatest barrier to successful business process change?
a. usability of implemented solution
b. selecting the correct process to change
c. ineffective project management
d. organizational culture
18
shapeType75fBehindDocument1pWrapPolygonVertices8;4;(21498,0);(0,0);(0,21489);(21498,21489)posrelh0posrelv0pib
95. Compared to the use of proprietary components, Web services promise to be less expensive
and less difficult to implement because of:
a. their ability to integrate seamlessly with legacy systems.
b. the ability to reuse Web services components.
c. the ubiquity of the Internet.
d. the use of universal standards.
96. development focuses on rapid delivery of working software by breaking a large
project into a series of small sub-projects that are completed in short periods of time using
iteration and continuous feedback.
a. Agile
b. Object-oriented
c. Rapid application
d. Joint application
97. On average, private sector IT projects underestimated budget and delivery time of systems by
___ percent.
a. 60
b. 40
c.30
d. 50
98. At the top of the management structure for information systems projects in a large company
is:
a. the corporate strategic planning group.
b. the cia.
c. the IS steering committee.
d. project management.
99. A road map indicating the direction of systems development, the rationale, the current
systems, new developments to consider, the management strategy, the implementation plan,
and the budget is called atn):
a. information systems plan.
b. portfolio analysis.
c. enterprise analysis.
d. project plan.
100. Which method would you use is used to develop risk profiles for a firm’s information system
projects and assets?
a. CSF
b. scoring model
c. portfolio analysis
d. information systems plan
19