Midterm Review Flashcards

1
Q

Zara’s use of information recourses has given it a substantial advantage over its competitors.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This risks of using information resources include all of the following except:

A

Missing cooperative opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Porter’s value chain framework suggests that a competitive advantage can stem from:

A

Lowering costs and adding value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kodak was once the largest supplier of photographic film. In 2004 it was dropped from the Dow Jones Industrial Average after having been listed for 74 years. Kodak failed to use IT to fend off which one of the following of Porter’s 5 competitive forces?

A

Threat of substitute products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is co-opetition?

A

Companies cooperate and compete at the same time

(Example: Microsoft builds laptops but also supplies their OS to other laptop makers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sustaining competitive advantage

A

Resources must be difficult to transfer or relatively immobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara andterm-48 Silk City is best described as:

A

Strategic alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

L.L. Bean is an online/catalog retail company that aggressively uses tools like instant messaging to communicate with customers regarding potential purchases and uses Facebook for branding activities. This use of technology supports which strategy?

A

Social business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organizations seek to gain a competitive advantage by differentiation, cost, or _________.

A

focus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which type of organizational structure is power distributed, and particularly suited for an environment that is dynamic and unstable?

A

Networked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The dimensions of national culture include all of the following EXCEPT:

A

The acceptance of technology by society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IS plays three important roles in management control processes. These processes are data collection, evaluation, and _______________.

A

communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following is a valid statement?

A

Most jobs today have a significant information systems component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when:

A

An employee whose laptop carrying unencrypted, sensitive military personnel information was stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ERP systems have all of the following characteristics except:

A

They are expensive but are easy to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise systems are large information systems that provide the core functionality needed to run a business and share data across all divisions of the business.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A manager must know enough about the IT architecture and IT infrastructure so that he or she can:

A

Make realistic use of IT and know what to expect from IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risks associated with cloud computing include all of the following EXCEPT:

A

Scalability
1. Increased dependency on third-party suppliers

  1. Security
  2. Retooling existing applications to move to the cloud
  3. Lack of standards for virtual infrastructures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:

  1. It could be dangerous because the email might be from Sam’s computer without his or her knowledge.
  2. It could be dangerous because Sam gave someone his password once a long time ago.
  3. It could be dangerous because the email might not really be from Sam.
  4. It could be dangerous even if it was sent knowingly because Sam didn’t know a virus might be attached.
A

None of the above (indicating that all are true).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Included in the five critical elements that are used to raise security in a firm are all of the following except:

A

Law enforcement

  1. Infrastructure
  2. Training
  3. Policies
  4. Investments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization.

A

managerial levers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This framework is called the ____________________ because it relates business strategy with IS strategy and organizational strategy.

A

Information Systems Strategy Triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A link between a firm’s IS strategy and organizational strategy focuses more on its external requirements than internal requirements.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Different organization structures reflect the different organizational strategies that are used by firms to implement their business strategy.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

When using information technologies to collect data for the purpose of monitoring workers, a manager should do all of the following EXCEPT:

A

Require workers to complete additional tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cognizant needed to reinvent its organizational structure many times to make sure that it properly facilitates the flow of information between employees.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which virtual team challenge is more difficult for managers to manage/manipulate since there may be a great deal of difference between groups and individuals?

A

Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Virtual teams and remote work have advantages but no known disadvantages over face-to-face teams and showing up at an office.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The speed and magnitude at which organizations must make changes today continues to decrease as a result of technology.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon.

A

Functional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A legacy system is all of the following, except:

A

A system that often holds the middle tier of a multiple-tier system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT:

A

Reduce dependency on third-party suppliers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

On the black market, stolen data in a “kit” that contains credit card information plus social security number and medical information is worth:

A

between $100 and $1,000 per record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

GE recognized that it could only sustain its competitive advantage for a limited time as competitors attempted to outmaneuver them. What was the model that Welch applied to help solve this problem?

A

Destroy your business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

When an organization qualifies its product or service in a way that allows it to appear unique in the marketplace, this is called:

A

Differentiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which one of the following is not considered to be a primary activity of the value chain of a firm?

A

Technology

38
Q

Which part of the value chain includes the manufacturing of goods?

A

Operations

39
Q

Organizational design is all about making sure that _________ are properly allocated, reflecting the structure of formal reporting relationships.

A

decision rights

40
Q

The use of performance data by managers is generally welcomed by workers and nonthreatening to workers when the data is used for compensation rather than to improve performance.

A

False

41
Q

IT has altered employees and the way they work by doing all of the following EXCEPT:

A

Providing distinct lines between work and play

42
Q

The concept of “jobs” is being replaced with the concept of work, requiring a framework that links the IS Strategy with the organization strategy to answer all of the following EXCEPT:

A

Who will develop the IS?

43
Q

_________________________ is an all-encompassing tool used for modeling, building, executing and monitoring business processes that go across organizational boundaries (and often systems).

A

Business Process Management systems

44
Q

The Six Sigma process received its name from:

A

Six standard deviations, or less than 3.4 deects per million

45
Q

_______________________ is the architecture where significant hardware, software and possibly even data elements reside on the Internet.

A

Web or Cloud-based architecture

46
Q

Mohawk’s need for flexibility required a change to its IT architecture. SOA was chosen by Mohawk because Mohawk:

A

Needed to be able to scale up or down operations as called for by the market or by its own arrangements with suppliers.

47
Q

___ of breaches are caused by stealing a password

A

A very high percentage (around 80%)

48
Q

When the Office of Personnel Management was hacked, all of the following are true except:

A

The hackers gained access to the building to steal the records

49
Q

The ____________ is a plan articulating where a business seeks to go and how it expects to get there.

A

business strategy

50
Q

The “Managerial Levers” concept is useful for the following reasons:

A

Management should not make a change unless they align multiple issues, such as tasks, measures, values, incentives, etc.

51
Q

Traditional organizations have one of four types of organizational design. What are these four structure types?

A

Hierarchical, flat, matrix, networked

52
Q

Which organization structure typically assigns workers two or more supervisors in an effort to make sure multiple dimensions of the business are integrated?

A

Matrix

53
Q

The Technology Acceptance Model states that the two main drivers of system use are management mandates and incentives.

A

False

54
Q

All of the following are new types of jobs created by the growing reliance on technology EXCEPT:

A

Editors/writers

55
Q

Personnel often react more favorable to incremental change rather than radical change because incremental change gives them control and ownership of improvements.

A

True

56
Q

Enterprise Rent-A-Car was able to model and better understand how service requests were handled and then optimize the process, greatly benefiting the customer experience. Enterprise achieved this benefit using which tool?

A

Business Process Management (BPM)

57
Q

Which of the following best describes cloud computing?

A

Computing services that can be accessed on demand across the Internet

58
Q

An “evil twin” in the context of computer security is:

A

A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

59
Q

Spoofing is:

A

When the “from” address says the name/email address of a person different from who really sent it.

60
Q

A general manager should:

A

Understand the use and consequences of technologies relevant to the business

61
Q

A link between a firm’s IS strategy and business strategy focuses more on its external requirements than internal requirements.

A

True

62
Q

Cognizant’s organizational structure was ________, but realized as its organization grew and its services became more complicated that a __________ structure for the organization was more appropriate.

A

hierarchical, matrix

63
Q

If a technology is to be successfully implemented into an organization, either the technology must fit the organization’s culture or the culture must be shaped to fit the behavioral requirements of the technology.

A

True

64
Q

As a result of increased flow of information, firms have seen an increase in middle managers.

A

False

65
Q

During an ice storm, JetBlue Airlines had an IT infrastructure that demonstrated which one of the following technical issues?

A

Scalability

66
Q

A computer’s hardware and ____________ specify its platform.

A

system software

67
Q

In the Office of Personnel Management’s case, the security breach made many people vulnerable to this.

A

Identity theft

68
Q

It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts

A

Several months

69
Q

A bank provides its customers mobile applications that significantly simplify traditional banking activities. For example, a customer can use a smartphone to take a picture of a check and electronically deposit into an account. This unique service demonstrates the bank’s desire to practice which one of Porter’s strategies?

A

Differentiation

70
Q

A social business strategy needs to align itself with the organization’s IT strategy but not the business strategy.

A

False

71
Q

A link between a firm’s IS strategy and business strategy focuses more on its external requirements than internal requirements.

A

True

72
Q

The ____________ view considers activities that create, deliver, and support a company’s product or service.

A

Porter value chain

73
Q

All statements below are true about a matrix organization structure EXCEPT:

A

One weakness is that multiple dimensions of a business are not integrated well with a matrix organization.

74
Q

In which type of organizational structure will employees report to two or more supervisors?

A

Matrix

75
Q

This type of organizational structure is based upon the concepts of division of labor, specialization, and unity of command. Key decisions are made at the top and filter down through the organization.

A

Hierarchical

76
Q

To help employees accept new technologies like an information system, a manager will do all of the following EXCEPT:

A

Provide minimal rationale for the new system

77
Q

This model suggests that employee attitudes may change if they think the new system will help them to do more or better work for the same effort, and that it’s easy to use. Employee participation in the system’s design and implementation also helps.

A

Technology Acceptance Model (TAM)

78
Q

ERP systems are credited with establishing new business models, rather than simply making a firm improve its practices.

A

False

79
Q

Early computer systems were designed to support the silo perspective rather than a cross-functional business process approach.

A

True

80
Q

A small company in Des Moines wants to set up an IT infrastructure for its workforce. The company recently moved to an older building that has solid walls and ceilings. Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops. Which communication infrastructure makes most sense for this company?

A

Wireless

81
Q

An IT architecture with a high level of flexibility and agility will be in a position to support changing business needs.

A

True

82
Q

Firewalls can be either in hardware or software form.

A

True

83
Q

An “evil twin” in the context of computer security is:

A

A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine

84
Q

Zara strategically uses information technologies to do all of the following EXCEPT:

A

Build silos of responsibilities with limited interaction between store managers, designers and market specialists

85
Q

Through the use of various technologies, a ski resort tracks the slopes each customer skis and the times he or she skis them. Skiers then have the ability to view this information online, and can choose to seamlessly share their accomplishments on Facebook. In addition, photographers positioned at the resort post pictures on Facebook for the skier. This ski resort has worked hard to develop a strong:

A

Social business strategy

86
Q

Business strategies based on hypercompetition focus on customer satisfaction and profit maximization but also build in a component of business intelligence. Business intelligence helps an agile organization to:

A

Predict and respond to new opportunities

87
Q

A matrix organization:

A

-Was rare for quite a while but have become more common in recent years
-Can involve multiple bosses and multiple teams
-Requires quite a bit of communication to be successful

88
Q

Porter’s five “Forces,” are used so often in the text for analysis of IT applications, include all of the following except:

A

Switching costs

89
Q

The major difference between an ERP and ERP II system is this feature.

A

Information is made immediately available to external stakeholders using social and collaborative tools

90
Q

The main benefit of ________ is that users can work collaboratively to easily create and edit Web pages, and link them to useful resources.

A

Wiki

91
Q

At Zara, decision rights for ordering have been granted to whom?

A

Store managers