1 Flashcards
Are customers and suppliers considered important elements of the information system because they provide key data?
No/false
—- is output from and information system that is returned to key people to help them evaluate or refine inputs for systems
Feedback
Which term refers to all of the hardware and software that a firm needs to achieve its business objectives
Information technology
Which is not an information technology tool that managers use to cope with change and complexity?
Data management technology
Computer software
Network technology
Business processes
The World Wide Web
Business processes
The problem solving model consist of problem identification, solution design, solution evaluation and choice, and ——
Implementation
The problem solving model phase where you determine a performance discrepancy that might be caused by an outdated system is the ___ phase
Problem identification
Regarding dimension of business problems, a lack of properly trained employees is considered a ___ dimension
People
All of the following are examples of technology dimension of business problems except
Insufficient network capacity
Agile hardware
Outdated business processes
Outdated software
Inadequate database capacity
Outdated business processes
Outsourcing of ________ can reduce IS development cost for U.S. organizations.
Production programming
Which of the following provides charts and graphs to assist senior management make non-routine decisions?
A. Executive support systems.
B. Management information systems.
C. Business intelligence.
D. Decision support systems.
E. Transaction processing system.
A. Executive support systems.
A single screen of graphs or charts of key performance indicators is known as a
Digital dashboard
Which of the following is an interorganizational system that provides a seamless flow of information to both suppliers of raw materials and to customers?
A. Executive support system
B. Supply chain management system
C. Knowledge management system
D. Business intelligence system
E. Customer relationship management system
B. Supply chain management system
Which of the following focuses on providing reports on current business performance to middle managers to help them make sound business decisions?
A. Business intelligence
B. Transaction processing systems
C. Executive support systems
D. Management information systems
E. Decision-support systems
D. Management information systems
A restaurant chef makes a recipe from meme out and doesn’t share or write down the recipe this is an example of ___ knowledge
Tactic knowledge
When a leading discount store’s database was breached, a lot of attention was on the company’s ——-, who is specifically responsible for training employees about security.
• A. systems analyst
• B. chief information officer
• C. chief security officer
• D. chief privacy officer
• E. chief financial officer
Chief security officer
The senior leadership position responsible for the organization’s day is called the ___ officer
Chief data
The senior leadership position responsible for the organization’s internal knowledge (i.e. tactic knowledge ) is called the ______
Chief knowledge officer
____ are the people or groups, both internal and external to the organization, for whom applications are developed
End users
A popular business organization that has a product or service created in the home country (i.e., McDonald’s and Chem Dry), and distributes the same products worldwide is known as a _____
A. Transnational
B. corporation
C. partnership
D. franchiser
E. multinational
Franchise
A domestic expediter strategy is characterized by which of the following
A. Decentralization
B. Virtual organization
C. Regionalization
D. Centralization
E. Tranationalism
Centralization
Business processes management (BPM) is concluded ____
Never
According to executive reports, the most significant barrier to both successful business process reengineering (BPR) and business process modeling (BPM) is ___
Organizational culture
The business process management (BPM) step that addresses the question of which process need to be addressed is _____
Identifying process for change
Among the five identified moral dimensions of the information age, which addresses the question of liability related to information systems?
Accountability and control
Amount the five identified moral dimensions of the information age, which addresses the question “which cultural values are supported by information technology?”
Quality of life
What technology trend raises ethical issues related to the limitless day that can be collected about you
Data storage cost rapidly declining
Which of the following is a powerful analysis technology that crunches data from multiple sources to find hidden connections and is typically used by the goverment?
NORA
If a co-worker accuses you of sending inappropriate emails, you should be afforded _____
Due process
If you accept a position as an information systems manager, you have a(n) ____ to accept the cost, benefits, and obligations for the decimos you make
Responsibility
Professional organizations like the American Medical Association have ____, which include specific conduct guidelines such as, do not harm
Protección al codes of conduct
Andrew analyzes an ethical issue at work, evaluates the outcomes of various options, and chooses the one that achieves the greatest value. Which ethical principle is Andrew applying?
• A. Kant’s categorical imperative
• B. Descartes’ rule of change
• C. Golden Rule principle
• D. Utilitarian principle
• E. Risk aversion principle
Utilitarian Principle
Which of the following is a 1973 report that served as the basis for most U.S. privacy laws
• A. Fair Information Practices (FIP)
•B. Federal Trade Commission (FTC)
• C. Central processing unit (CPU)
• D. Structured Query Language (SQL)
• E. Generally Accepted Accounting Principles (GAAP)
Fair information practices (FIP)
A formal name to describe self-regulating policies is called ___
A. due process
B. privacy
C. accountability
D. liability
E. a safe harbor
A safe harbor
If you return to a website that welcomes you back by name, you likely have a small text file on your computer with information about your prior visits called a _____
Cookiw
The use and regulation of trade secrets, copyrights, and patents is the U.S. government’s attempt to protect ___
• A. capitalism
• B. consumer rights
• C. consumer data
• D. government secrets
• E. intellectual property
Intellectual property
An unethical but not illegal act committed using a computer is called ___
• A. malicious
• B. computer fraud
• C. computer crime
• D. closed source
• E. computer abuse
Computer abuse
Putting a key logger on your boss’s computer without permission would be consider _____
A computer crkme
_____ is the most common repetitive stress injury (RSI) related to using computer keyboards.
Carpal tunnel syndrome
Which statement about social and cultural issues and the prevalence of information systems is FALSE?
• A. The prevalence of information systems has increased the ability to telecommute while confusing the separation between work and personal life.
• B. The prevalence of information systems has led to an increased reliance on information systems.
• C. The prevalence of information systems has led to increased work efficiency while reducing the number of middle manager positions.
• D. The prevalence of information systems is an equalizer for social classes and minorities.
• E. It is easier for a business to quickly change, but competitive advantage is maintained for shorter time frames.
D. The prevalence of information systems is an equalizer for social classes and minorities.
Due to difuntas dice there is increasing inequality