Midterm Review Flashcards

1
Q

Zara’s use of information recourses has given it a substantial advantage over its competitors.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This risks of using information resources include all of the following except:

A

Missing cooperative opportunities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Porter’s value chain framework suggests that a competitive advantage can stem from:

A

Lowering costs and adding value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kodak was once the largest supplier of photographic film. In 2004 it was dropped from the Dow Jones Industrial Average after having been listed for 74 years. Kodak failed to use IT to fend off which one of the following of Porter’s 5 competitive forces?

A

Threat of substitute products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is co-opetition?

A

Companies cooperate and compete at the same time

(Example: Microsoft builds laptops but also supplies their OS to other laptop makers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sustaining competitive advantage

A

Resources must be difficult to transfer or relatively immobile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Suppose Zara has a linked supply chain with Silk City, a fabric supplier. Zara and Silk City use IT to seamlessly exchange data, communicating requirements as well as delivery expectations. The relationship between Zara andterm-48 Silk City is best described as:

A

Strategic alliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

L.L. Bean is an online/catalog retail company that aggressively uses tools like instant messaging to communicate with customers regarding potential purchases and uses Facebook for branding activities. This use of technology supports which strategy?

A

Social business strategy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Organizations seek to gain a competitive advantage by differentiation, cost, or _________.

A

focus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In which type of organizational structure is power distributed, and particularly suited for an environment that is dynamic and unstable?

A

Networked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The dimensions of national culture include all of the following EXCEPT:

A

The acceptance of technology by society

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IS plays three important roles in management control processes. These processes are data collection, evaluation, and _______________.

A

communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which one of the following is a valid statement?

A

Most jobs today have a significant information systems component.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Department of Veterans Affairs (VA) realized it did not have adequate policies, education or technology in place for remote workers when:

A

An employee whose laptop carrying unencrypted, sensitive military personnel information was stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ERP systems have all of the following characteristics except:

A

They are expensive but are easy to use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Enterprise systems are large information systems that provide the core functionality needed to run a business and share data across all divisions of the business.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A manager must know enough about the IT architecture and IT infrastructure so that he or she can:

A

Make realistic use of IT and know what to expect from IT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risks associated with cloud computing include all of the following EXCEPT:

A

Scalability
1. Increased dependency on third-party suppliers

  1. Security
  2. Retooling existing applications to move to the cloud
  3. Lack of standards for virtual infrastructures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

If you receive an email that says it is from Sam Johnson, your boss, with an odd EXE file as an attachment, it could be dangerous for all of the following reasons except:

  1. It could be dangerous because the email might be from Sam’s computer without his or her knowledge.
  2. It could be dangerous because Sam gave someone his password once a long time ago.
  3. It could be dangerous because the email might not really be from Sam.
  4. It could be dangerous even if it was sent knowingly because Sam didn’t know a virus might be attached.
A

None of the above (indicating that all are true).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Included in the five critical elements that are used to raise security in a firm are all of the following except:

A

Law enforcement

  1. Infrastructure
  2. Training
  3. Policies
  4. Investments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Organizational, cultural, and control variables are considered the ________ used by decision makers to effect change in their organization.

A

managerial levers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This framework is called the ____________________ because it relates business strategy with IS strategy and organizational strategy.

A

Information Systems Strategy Triangle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A link between a firm’s IS strategy and organizational strategy focuses more on its external requirements than internal requirements.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Different organization structures reflect the different organizational strategies that are used by firms to implement their business strategy.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
When using information technologies to collect data for the purpose of monitoring workers, a manager should do all of the following EXCEPT:
Require workers to complete additional tasks.
26
Cognizant needed to reinvent its organizational structure many times to make sure that it properly facilitates the flow of information between employees.
True
27
Which virtual team challenge is more difficult for managers to manage/manipulate since there may be a great deal of difference between groups and individuals?
Diversity
28
Virtual teams and remote work have advantages but no known disadvantages over face-to-face teams and showing up at an office.
False
29
The speed and magnitude at which organizations must make changes today continues to decrease as a result of technology.
False
30
In this business structure the firm is a hierarchy organized around a set of functions. Each group has a core competency that it concentrates upon.
Functional
31
A legacy system is all of the following, except:
A system that often holds the middle tier of a multiple-tier system.
32
All of the following are reasons why a company may choose to use cloud computing for its IT infrastructure EXCEPT:
Reduce dependency on third-party suppliers
33
On the black market, stolen data in a "kit" that contains credit card information plus social security number and medical information is worth:
between $100 and $1,000 per record
34
A hacker who buys credit card information from hackers receives a short-term guarantee in case the card is declined.
True
35
GE recognized that it could only sustain its competitive advantage for a limited time as competitors attempted to outmaneuver them. What was the model that Welch applied to help solve this problem?
Destroy your business
36
When an organization qualifies its product or service in a way that allows it to appear unique in the marketplace, this is called:
Differentiation
37
Which one of the following is not considered to be a primary activity of the value chain of a firm?
Technology
38
Which part of the value chain includes the manufacturing of goods?
Operations
39
Organizational design is all about making sure that _________ are properly allocated, reflecting the structure of formal reporting relationships.
decision rights
40
The use of performance data by managers is generally welcomed by workers and nonthreatening to workers when the data is used for compensation rather than to improve performance.
False
41
IT has altered employees and the way they work by doing all of the following EXCEPT:
Providing distinct lines between work and play
42
The concept of "jobs" is being replaced with the concept of work, requiring a framework that links the IS Strategy with the organization strategy to answer all of the following EXCEPT:
Who will develop the IS?
43
_________________________ is an all-encompassing tool used for modeling, building, executing and monitoring business processes that go across organizational boundaries (and often systems).
Business Process Management systems
44
The Six Sigma process received its name from:
Six standard deviations, or less than 3.4 deects per million
45
_______________________ is the architecture where significant hardware, software and possibly even data elements reside on the Internet.
Web or Cloud-based architecture
46
Mohawk's need for flexibility required a change to its IT architecture. SOA was chosen by Mohawk because Mohawk:
Needed to be able to scale up or down operations as called for by the market or by its own arrangements with suppliers.
47
___ of breaches are caused by stealing a password
A very high percentage (around 80%)
48
When the Office of Personnel Management was hacked, all of the following are true except:
The hackers gained access to the building to steal the records
49
The ____________ is a plan articulating where a business seeks to go and how it expects to get there.
business strategy
50
The "Managerial Levers" concept is useful for the following reasons:
Management should not make a change unless they align multiple issues, such as tasks, measures, values, incentives, etc.
51
Traditional organizations have one of four types of organizational design. What are these four structure types?
Hierarchical, flat, matrix, networked
52
Which organization structure typically assigns workers two or more supervisors in an effort to make sure multiple dimensions of the business are integrated?
Matrix
53
The Technology Acceptance Model states that the two main drivers of system use are management mandates and incentives.
False
54
All of the following are new types of jobs created by the growing reliance on technology EXCEPT:
Editors/writers
55
Personnel often react more favorable to incremental change rather than radical change because incremental change gives them control and ownership of improvements.
True
56
Enterprise Rent-A-Car was able to model and better understand how service requests were handled and then optimize the process, greatly benefiting the customer experience. Enterprise achieved this benefit using which tool?
Business Process Management (BPM)
57
Which of the following best describes cloud computing?
Computing services that can be accessed on demand across the Internet
58
An "evil twin" in the context of computer security is:
A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
59
Spoofing is:
When the "from" address says the name/email address of a person different from who really sent it.
60
A general manager should:
Understand the use and consequences of technologies relevant to the business
61
A link between a firm's IS strategy and business strategy focuses more on its external requirements than internal requirements.
True
62
Cognizant's organizational structure was ________, but realized as its organization grew and its services became more complicated that a __________ structure for the organization was more appropriate.
hierarchical, matrix
63
If a technology is to be successfully implemented into an organization, either the technology must fit the organization's culture or the culture must be shaped to fit the behavioral requirements of the technology.
True
64
As a result of increased flow of information, firms have seen an increase in middle managers.
False
65
During an ice storm, JetBlue Airlines had an IT infrastructure that demonstrated which one of the following technical issues?
Scalability
66
A computer's hardware and ____________ specify its platform.
system software
67
In the Office of Personnel Management's case, the security breach made many people vulnerable to this.
Identity theft
68
It usually takes ____ for someone in a firm to discover a security compromise in a system, after the evidence shows up in logs or alerts
Several months
69
A bank provides its customers mobile applications that significantly simplify traditional banking activities. For example, a customer can use a smartphone to take a picture of a check and electronically deposit into an account. This unique service demonstrates the bank's desire to practice which one of Porter's strategies?
Differentiation
70
A social business strategy needs to align itself with the organization's IT strategy but not the business strategy.
False
71
A link between a firm's IS strategy and business strategy focuses more on its external requirements than internal requirements.
True
72
The ____________ view considers activities that create, deliver, and support a company's product or service.
Porter value chain
73
All statements below are true about a matrix organization structure EXCEPT:
One weakness is that multiple dimensions of a business are not integrated well with a matrix organization.
74
In which type of organizational structure will employees report to two or more supervisors?
Matrix
75
This type of organizational structure is based upon the concepts of division of labor, specialization, and unity of command. Key decisions are made at the top and filter down through the organization.
Hierarchical
76
To help employees accept new technologies like an information system, a manager will do all of the following EXCEPT:
Provide minimal rationale for the new system
77
This model suggests that employee attitudes may change if they think the new system will help them to do more or better work for the same effort, and that it's easy to use. Employee participation in the system's design and implementation also helps.
Technology Acceptance Model (TAM)
78
ERP systems are credited with establishing new business models, rather than simply making a firm improve its practices.
False
79
Early computer systems were designed to support the silo perspective rather than a cross-functional business process approach.
True
80
A small company in Des Moines wants to set up an IT infrastructure for its workforce. The company recently moved to an older building that has solid walls and ceilings. Furthermore, most of the staff likes the flexibility of moving around the open office space to perform work on their laptops. Which communication infrastructure makes most sense for this company?
Wireless
81
An IT architecture with a high level of flexibility and agility will be in a position to support changing business needs.
True
82
Firewalls can be either in hardware or software form.
True
83
An "evil twin" in the context of computer security is:
A counterfeit wifi connection in a hotel or coffee shop that appears to be genuine
84
Zara strategically uses information technologies to do all of the following EXCEPT:
Build silos of responsibilities with limited interaction between store managers, designers and market specialists
85
Through the use of various technologies, a ski resort tracks the slopes each customer skis and the times he or she skis them. Skiers then have the ability to view this information online, and can choose to seamlessly share their accomplishments on Facebook. In addition, photographers positioned at the resort post pictures on Facebook for the skier. This ski resort has worked hard to develop a strong:
Social business strategy
86
Business strategies based on hypercompetition focus on customer satisfaction and profit maximization but also build in a component of business intelligence. Business intelligence helps an agile organization to:
Predict and respond to new opportunities
87
A matrix organization:
-Was rare for quite a while but have become more common in recent years -Can involve multiple bosses and multiple teams -Requires quite a bit of communication to be successful
88
Porter's five "Forces," are used so often in the text for analysis of IT applications, include all of the following except:
Switching costs
89
The major difference between an ERP and ERP II system is this feature.
Information is made immediately available to external stakeholders using social and collaborative tools
90
The main benefit of ________ is that users can work collaboratively to easily create and edit Web pages, and link them to useful resources.
Wiki
91
At Zara, decision rights for ordering have been granted to whom?
Store managers