1. ________ occur(s) when data are isolated in separated information systems.
A.
Walled garden
B.
Information silos
C.
Scheduling
D.
System integration
2. Which of the following is true about personal information systems?
A.
Personal information systems that support a particular department are sometimes called departmental information systems.
B.
Because one is the sole user of the new system, if new procedures are required, one needs professional help to get the job done.
C.
Such systems have only one user and hence procedures need not be documented or formalized in any significant way.
D.
The solutions to problems in a personal information system usually involve more than one department.
3. Which of the following is an example of a personal information system?
A.
scheduling of groundskeeping
B.
contact manager
C.
charging of membership fees
D.
ordering of restaurant supplies from suppliers
4. A Web store front is an example of a(n) ________.
A.
interenterprise information system
B.
collaborative information system
C.
functional information system
D.
departmental information system
5. ________ are information systems that are shared by two or more independent organizations.
A.
Interenterprise information systems
B.
Workgroup information systems
C.
Enterprise information systems
D.
Personal information systems
6. Which of the following applications falls under the common departmental information system of sales and marketing?
A.
order tracking
B.
general ledger
C.
lead generation
D.
assessment
7. ________ is an application of the human resources department.
A.
Compensation
B.
Planning
C.
Financial reporting
D.
Lead tracking
8. Which of the following is a consequence of isolated information systems?
A.
Data cannot get duplicated.
B.
Business processes are coherent and efficient.
C.
Decision are made is union with other systems.
D.
There is a lack of integrated enterprise information.
9. ________ is the activity of altering and designing business processes to take advantage of new information systems.
A.
Business process management
B.
Business process reengineering
C.
Business process improvement
D.
Business process interoperability
10. Inherent processes are ________.
A.
time-consuming business processes and involve substantial investment.
B.
predesigned procedures for using the software products
C.
result from altering & designing business processes to take advantage of new information systems.
D.
preferred by employees due to the ease & structure they bring to functional applications.
11. B2B refers to e-commerce sales between:
A.
business and banks
B.
business and customers
C.
business and government
D.
businesses
12. E-commerce businesses dealing with sales between a supplier and a retail consumer are ________.
A.
B2C
B.
B2 ...
1. ________ occur(s) when data are isolated in separated informa.docx
1. 1. ________ occur(s) when data are isolated in separated
information systems.
A.
Walled garden
B.
Information silos
C.
Scheduling
D.
System integration
2. Which of the following is true about personal information
systems?
A.
Personal information systems that support a particular
department are sometimes called departmental information
systems.
B.
2. Because one is the sole user of the new system, if new
procedures are required, one needs professional help to get the
job done.
C.
Such systems have only one user and hence procedures need not
be documented or formalized in any significant way.
D.
The solutions to problems in a personal information system
usually involve more than one department.
3. Which of the following is an example of a personal
information system?
A.
scheduling of groundskeeping
B.
contact manager
C.
charging of membership fees
D.
ordering of restaurant supplies from suppliers
3. 4. A Web store front is an example of a(n) ________.
A.
interenterprise information system
B.
collaborative information system
C.
functional information system
D.
departmental information system
5. ________ are information systems that are shared by two or
more independent organizations.
A.
Interenterprise information systems
B.
Workgroup information systems
C.
Enterprise information systems
4. D.
Personal information systems
6. Which of the following applications falls under the common
departmental information system of sales and marketing?
A.
order tracking
B.
general ledger
C.
lead generation
D.
assessment
7. ________ is an application of the human resources
department.
A.
Compensation
B.
5. Planning
C.
Financial reporting
D.
Lead tracking
8. Which of the following is a consequence of isolated
information systems?
A.
Data cannot get duplicated.
B.
Business processes are coherent and efficient.
C.
Decision are made is union with other systems.
D.
There is a lack of integrated enterprise information.
9. ________ is the activity of altering and designing business
processes to take advantage of new information systems.
6. A.
Business process management
B.
Business process reengineering
C.
Business process improvement
D.
Business process interoperability
10. Inherent processes are ________.
A.
time-consuming business processes and involve substantial
investment.
B.
predesigned procedures for using the software products
C.
result from altering & designing business processes to take
advantage of new information systems.
7. D.
preferred by employees due to the ease & structure they bring to
functional applications.
11. B2B refers to e-commerce sales between:
A.
business and banks
B.
business and customers
C.
business and government
D.
businesses
12. E-commerce businesses dealing with sales between a
supplier and a retail consumer are ________.
A.
B2C
B.
B2B
8. C.
B2G
D.
C2C
13. Jackson Enterprises sells online directly to the EPA.
Jackson is engaging in ________ e-commerce.
A.
B2B
B.
B2C
C.
B2G
D.
B2E
14. To allow online customers to enter and mange their orders, a
firm may create a/an.
10. 16. A company that matches buyers and sellers based on price
matched transactions is a(n) ________.
A.
B2C
B.
clearinghouse
C.
auction
D.
electronic exchange
17. A(n) ________ provides goods and services at a stated price
and arrange for delivery of the same, but does not take
possession.
A.
B2C
B.
clearinghouse
C.
11. auction
D.
electronic exchange
18. The elimination of the middle layers of the supply chain is
called ________.
A.
price conflict
B.
disintermediation
C.
price elasticity
D.
channeling
19. When HP Computers began to sell directly to the public,
some retailers resented the competition and dropped the HP
lines from their stores. This is an example of ________.
A.
channel conflict
12. B.
price conflict
C.
logistics expense
D.
price elasticity
20. Which of the following is NOT one of the three tiers in
tiered architecture?
A.
User
B.
Server
C.
Client
D.
Database
21. A petabyte of data is equal to ________ gigabytes of data.
13. HINT: Check out the index in your book.
A.
1,000,000
B.
1,000
C.
100
D.
10
22. ________ systems use statistical analysis to process data.
A.
KM
B.
Expert
C.
Reporting
14. D.
Data-mining
23. ________ systems are programs that read data from a
variety of sources, process that data, and produce and deliver
formatted reports to users.
A.
KM
B.
Data-mining
C.
Expert
D.
Reporting
24. ________ computes the correlation of items on past orders
to determine items frequently purchased together.
A.
Market-basket analysis
B.
15. Knowledge-management systems
C.
Expert systems
D.
Clickstream data reports
25. If/Then rules are used with:
A.
data-mining systems
B.
knowledge-management systems
C.
expert systems
D.
reporting systems
26. Which of the following is NOT an example of dirty data?
A.
16. Missing values
B.
Inconsistent data
C.
Problematic data
D.
Coarseness
27. On a web site, a customer's clickstream data provides a
record of ________ on the site.
A.
ads viewed
B.
everything done
C.
hyperlinks clicked
D.
queries made
17. 28. A data warehouse also contains a special database that
stores the ________, which records its source, history, format,
and constraints.
A.
dirty data
B.
metadata
C.
clickstream data
D.
operational data
29. Data collections that address a functional area of a business
are called ________.
A.
data marts
B.
data warehouses
C.
18. data mines
D.
database systems
30. Regression analysis is used in ________.
A.
data-mining systems
B.
knowledge-management systems
C.
expert systems
D.
reporting systems
31. Which of the following is NOT one of the IT department's
major responsibilities?
A.
Provide all users with the software that they want.
19. B.
Plan for information systems and IT structure.
C.
Maintain information systems.
D.
Protect data.
32. Which of the following is NOT one of the three principal
reasons why employees need to know about the IS department?
A.
to be a better informed and effective manager or executive
B.
to be an effective consumer of the IT department's resources
C.
to ensure that the functions of the IT department are performed
D.
to have access to information beyond the immediate requirement
of one's job description
33. Which of the following statements is true regarding the IT
department's responsibility of planning for information systems
20. (IS) and IT infrastructure?
A.
While they assist the organization to achieve its goals, they do
not have any particular impact on its competitive advantage.
B.
IT infrastructure and systems are independent of the functioning
of the other departments.
C.
All projects involving IS are a part of a business system or
facilitate some business goal.
D.
IT infrastructure and systems are known to be particularly
adaptive to changing conditions.
34. An organization that can quickly adapt to changes in the
market, industry, product, law, or other significant external
factors is referred to as a(n) ________.
A.
functional enterprise
B.
bureaucratic organization
21. C.
network organization
D.
agile enterprise
35. After planning for information systems and IT
infrastructure, the next step is ________.
A.
creating, developing, and adapting both information systems
and IT infrastructure
B.
operating and managing the information systems and IT
infrastructure
C.
maintaining information systems and managing IT infrastructure
D.
protecting infrastructure and data from threats
36. Which of the following is true about protecting
infrastructure and data?
22. A.
The IT department is responsible for protecting infrastructure
and data from threats.
B.
One of the sources of threats to IT infrastructure is malicious
human activity.
C.
The responsibility of identifying threats is left to the IS
department while managing these threats is the IT department's
job.
D.
The IS department works with the CTO and others in the
organization to determine what safeguards to implement, or
stated differently, what level of risk to assume.
37. Other titles for the ________ include director of information
services and director of computer services.
A.
CTO
B.
CFO
23. C.
CEO
D.
CIO
38. 8 Which of the following is true for the technology group in
most IS departments?
A.
The size and structure of the technology group depends on
whether programs are developed in-house.
B.
The technology group exists in organizations that have
negotiated outsourcing agreements with other companies to
provide equipment, applications, or other services.
C.
A technology office investigates new information systems
technologies and determines how the organization can benefit
from them.
D.
The technology department manages the computing
infrastructure, including individual computers, computer
centers, networks, and communications media.
24. 39. Which of the following sentences is true for the
development group of an IS department?
A.
The development group manages the process of creating new
information systems as well as maintaining existing information
systems.
B.
An important function for the development group is to monitor
user experience and respond to user problems.
C.
This group exists in organizations that have negotiated
outsourcing agreements with other companies to provide
equipment, applications, or other services.
D.
The purpose of the development group is to protect data and
information assets by establishing data standards and data
management practices and policies.
40. Which of the following is NOT a responsibility of a systems
analyst?
A.
developing procedures
25. B.
writing programs
C.
determining system requirements
D.
designing job descriptions
41. Which of the following is NOT and example of one of the
main sources of security threats?
A.
Human error.
B.
Hacking.
C.
Hurricanes.
D.
Computer failure.
42. Which of the following is an example of human mistakes?
26. A.
Employees purposely destroying data.
B.
Viruses.
C.
None of the above.
D.
Poorly written programs.
43. A ________ is someone who pretends to be a legitimate
company and sends email requesting confidential data.
A.
hacker
B.
spoofer
C.
sniffer
27. D.
phisher
44. _______ is a technique for intercepting computer
communications.
A.
Sniffing
B.
Spoofing
C.
Hacking
D.
Pretexting
45. Unauthorized data disclosure can occur by ________ when
proprietary information is released to the press.
A.
phishing
B.
28. human error
C.
hacking
D.
spoofing
46. In order to intercept communications on ________
networks, drive-by sniffers simply drive or walk around with
computers with wireless connections.
A.
local area
B.
wireless
C.
public
D.
commercial
47. Some unauthorized programs are able to ________ the
legitimate system and substitute their own processing.
30. 49. Organizations should protect sensitive data by storing it in
________ form.
A.
digital
B.
standardized
C.
authenticated
D.
encrypted
50. ________ safeguards involve the people and procedure
components of information systems.
A.
Human
B.
Hacker
31. C.
Technical
D.
Account
Betty Ford’s leadership was revolutionary with the interest of
the common and disadvantaged population. This is because Mrs.
Ford was always willing to help and be a voice for the inferior
individuals in society. Her leadership was revolutionary because
she went against all odds as First Lady by advocating for equal
rights for men and women. She was able to gain the trust of
many Americans because they felt that she was genuine, had a
concern for them and that she was good person. Up until this
time, most First Ladies supported their husband’s policies, but
Mrs. Ford created her own objective. Authentic leader use their
life experiences to help themselves and other around them. She
helped many women who were diagnosed with cancer by
declaring that she suffered from breast cancer and detailed her
treatment process. Given the amount of women who are affected
by breast cancer, she was courageous by involving herself in
the cause and bringing it to the forefront of the nation. She gave
hope and encouragement to other women suffering from breast
cancer and promoting a campaign for women to seek screening
and treatment of breast cancer with their doctors. Mrs. Ford’s
leadership was also revolutionary because contrary to both men
and women, she revealed that she was addicted to alcohol. She
sought treatment for alcoholism and she established the
nonprofit Betty Ford Center to help addicts recover from
multiple drug addictions. Mrs. Ford also helped changed
Americans view and opinions on social topics such as abortion,
32. premarital sex, and equality. She spoke up,stayed true to her
core beliefs and did not waiver from her truths. Comment by
MS User1: No cover page, no title on first page Comment by
MS User1: Insert comma Comment by Rochelle: Word missing.
Comment by MS User1: Delete space Comment by MS
User1: Insert space Comment by MS User1: Maintain double
spacing throughout essay
There are several ways through her leadership that Mrs.
Ford can be described as authentic. First, through her leadership
she advocated for the welfare of all people including minorities
and women. Secondly, she led by example as witnessed by the
description of how she was treated for breast cancer and
admitting she was addicted to alcohol. This was not heard of
during this period of time as it was humiliating to admit as a
man but especially as a woman. Lastly, she helped to create
equality and awareness through her leadership by creating the
nonprofit Betty Ford Center to help alcoholics and other drug
addicts to overcome their addiction. She publicly acknowledged
that she had an addiction and that it was not abnormal. She did
not hide her struggles, but came out and explained how she was
suffering and how she overcame the suffering, she was authentic
in her leadership.
Grading Guide Contemporary Leadership - Individual Week
4
Content 60 Percent
Points Earned 6/6
Using the contemporary public leader that was selected for the
Week One Individual Assignment, the Internet or University
Library, and Ch. 8, 9, 10, & 11 of Leadership: Theory and
Practice, explain how the selected contemporary public leader
effectively applied leadership skills when dealing with
employees within the public organization they serve.
Comments: Your paper was good, but could have been enhanced
by a better description of the leadership skills your selected
leader utilizes.
33. Organization and Development 20 Percent
Points Earned 1.5/2
· The paper is 700 to 1050 words in length.
· The paper is clear and organized; major points are
supported by details, examples, or analysis.
· The tone aligns with the assignment's purpose and is geared
towards the appropriate audience.
· The paper provides relevant background on the topic and
uses visual aids appropriately and effectively.
· The paper is logical, flows, and reviews the major points.
Comments: Well below the word count at 421 words. Required
more details and examples of the leadership skills.
Mechanics and Format 20 Percent
Points Earned .5/2
· The assignment file is presentable and functional.
· Rules of grammar, usage, and punctuation are followed;
spelling is correct.
· The paper--including the title page, reference page, tables,
and any appendixes--is consistent with APA guidelines.
Intellectual property is recognized with in-text citations and
references.
Comments: No cover page, no title on first page of essay, no
reference page, no in-text citations.
Total Percent 100
Total Earned 6/10
Additional Comments:
The use of peer reviewed sources is critical in academic work
because it adds validity to what you say. On the other hand, if
you use the thoughts, ideas, or words of others without citations
or referencing that work, it is plagiarism. Either way it is a
very serious problem. You incurred a 2 point penalty for failing
to provide source information on this document.
1. The observation that "The number of transistors per square
34. inch on an integrated chip doubles every 18 months." is known
as ________ Law.
A. Murphy's B. Metcalfe's C. Moore's D. Amdahl's
2. Because the cost of data storage and data communications is
essentially zero, any routine skill will be ________.
A.performed in-house by skilled professionals
B.outsourced to the lowest bidder
C.performed in-house by semi-skilled professionals
D.outsourced to a vendor who is geographically closer
3. In today's world, skills such as tax accounting and computer
programming no longer guarantee job security. What is the
reason for this?
A.
They are nonroutine skills which are no longer required in these
technologically advanced times.
B.
They are routine skills which can and will be outsourced to the
lowest bidder.
C.
They are nonroutine skills which can be performed by only
certain groups of employees.
D.
They are routine skills which are not needed in most modern
35. organizations.
4. ________ is the ability to make and manipulate models of
reality
A. Systems thinking B. Abstract reasoning C. Social learning
D. Experimentation
5. A group of components that interact to achieve a purpose is
referred to as a(n) ________.
A. Element B. System C. Entity D. Process
6. Which of the following is a valid reason for a company to
create a new information system?
A.Most companies in the industry use information systems.
B.The company needs to project a modern image.
C.The new information system will increase employee
productivity.
D.The company does not want to fall behind the technology
curve.
7. Which of the following is the most crucial requirement for
the success of a security system?
A.Firewalls should be installed and updated regularly.
B.Users should take security seriously.
C.Anti-virus software should be installed.
D.Administrative authority should be distributed among team
members.
8. The five-component framework of an IS consists of computer
hardware, software, data, people & ________.
A. Tools B. Bugs C. Procedures D. Device drivers
36. 9. Effective collaboration is all about being nice to your team
members.
A. True
B. False
10. Modeling a unit's components and showing how
components' inputs and outputs relate to one another is an
example of systems thinking.
A. True
B. False
11. Which of the following would make the best primary key?
A.
Student Number
B.
Date of Birth
C.
All are equally good primary keys
D.
Major
12. Microsoft Access is what kind of database?
37. Relational B. Network C. Hierarchical D. None of the above
13. What kind of key is used to link tables together?
A.
Foreign key
B.
Access key
C.
Composite key
D.
Primary key
14. What is a person, place or thing about which you wish to
keep data?
A.Entity B.Noun C.Attribute D.Relationship
15. A(n)________ is a network of activities, roles, resources,
repositories, and data flows that interact to accomplish a
business function.
A.Task force B.Workgroup C.Grid D.Business process
16. ________ are collections of related tasks that receive inputs
and process those inputs to produce outputs.
A.Resources B.Repositories C.Activities D.Databases
38. 17. ________ are sets of procedures.
A.Resources B.Activities C.Roles D.Data flows
18. A decision is a ________.
A.Collection of business records
B.Question that can be answered yes or no.
C.Set of procedures
D.Movement of a data item from one activity to another
19. Which of the following components provide branching
points within the flow of a business process?
A.
Decisions
B.
Repositories
C.
Activities
D.
Roles
20. ________ are people, facilities, or computer programs that
are assigned to roles
A.
Repositories
39. B.
Activities
C.
Resources
D.
Networks
21. A(n) ________ is a collection of business records.
A.
Repository
B.
Role
C.
Resource
D.
Activity
22. What is the defining characteristic of the outermost
components (hardware and people) of the IS framework?
40. A.They are sunk costs.
B.They are both sets of instructions.
C.They take actions.
D.They are the costliest components in the framework.
23. John Reed's height is 1.9 meters. This fact is an example of
________ .
A.
Substance
B.
Information
C.
Data
D.
Content
24. Which of the following refers to information that is based
on correct and complete data, and has been processed correctly
as expected?
A.
Relevant information
B.
Measurable information
41. C.
Accurate information
D.
Timely information
25. The competitive strategy followed by an organization is
derived from its ________.
A.
function
B.
structure
C.
profits
D.
goals
26. The competitive strategy of an organization determines its
________.
A.
industry rivals
42. B.
short-term goals
C.
value chains
D.
structure
27. In which of the following situations would the suppliers
have the strongest bargaining power?
A.
coffee planters during a season of frost that decreases
production
B.
companies negotiating compensation during a booming economy
C.
providers of logistic support during an economic slowdown
D.
a wholesaler declaring a stock-clearance sale
28. Simpson's Lawn Services decides to offer two free mowing
services for all customers who booked garden landscaping in the
43. fall. By doing this, which of the following forces is Simpson's
addressing?
A.
the control exercised by Acme Corp. who supplies Simpson with
lawn mowers
B.
the power held by the landlord of the Simpson office space
C.
the threat posed by Roger's Landscapes, a new competitor
D.
the bargaining power of the City Football Club who are their
customers
29. Porter's model includes the bargaining power of which of
the following groups as one of the five factors?
A.
investors
B.
competitors
44. C.
employees
D.
customers
30 In Porter's five factor model, each of the three competitive
forces concerns the danger of ________.
A.
suppliers favoring rival companies
B.
customers taking their business elsewhere
C.
investors refusing to back up new projects
D.
employees not working towards organizational goals
31. Two strength factors that relate to all three competitive
forces are ________ and customer loyalty.
A.
market forces
45. B.
nature of products
C.
customer satisfaction
D.
switching costs
32. If customers perceive the benefits of a substitute to be
similar to that of a product then ________.
A.
the threat of the substitute is weak
B.
the price should be increased to retain market
C.
the threat from the substitute is strong
D.
there is no threat from the substitute
33. Which of the following is an example of a competitive
46. strategy employed by a firm?
A.
increasing the price of its product when raw material prices
increase
B.
laying off staff in order to cut down costs during a recession
period
C.
advertising its products nationwide like its competitor
organizations
D.
launching a unique product targeted at a section of consumers
34. Free question break - answer A.
A.
CORRECT
B.
WRONG
C.
47. WRONG
D.
Two WRONGS don't make a RIGHT. ANSWER A
35. How many bits are in an ASCII byte?
A.
1
B.
2
C.
4
D.
8
36. Direct access is to _______________as sequential access is
to _________________.
A.
Hard Drive/USB Drive
48. B.
USB Drive/DVD Drive
C.
Hard Drive/Magnetic Tape
D.
None of the above.
37. The Internet and the World Wide Web are interchangeable
terms.
A.
True
B.
False
38. What class of software manages and controls the resources
of a computer system?
A.
Application
B.
Operating System
49. C.
Productivity
D.
Database
39. Which of the following types of computer displays uses less
power?
A.
CRT
B.
LCD
C.
Plasma
D.
None of the above they¿re all pigs.
40. The primary pair of protocols used by the Internet for all
data transmission are:
50. A.
TCP/IP
B.
XML/HTML
C.
XML/WiFi
D.
SMTP/HTTP
41. RAM memory is described as volatile because __________.
A.
it can be read and used but it cannot be altered
B.
data and programs can be transferred into and out of RAM
C.
the programs and data stored in RAM are erased when the power
to the computer is turned off.
D.
it retains its contents even when the power is turned off
51. 42. Which of the following operating systems is most commonly
used?
A.
Linux
B.
Windows
C.
Unix
D.
Mac OS
43. Which of the following is true of a client?
A.
They usually have multiple CPUs.
B.
They have software that enables them to connect to a network.
C.
They have limited video displays or no display at all.
52. D.
They can process emails or large shared databases.
44. Free question break - answer A.
A.
CORRECT
B.
WRONG
C.
WRONG
D.
Two WRONGS don¿t make a RIGHT¿ANSWER A.
45. The process of creating and maintaining information
systems is called:
A.
systems development
B.
54. 47. Information systems are never off-the-shelf because they
involve:
A.
programs
B.
data
C.
people
D.
all of the above
48. System development is a process for creating and ________
information systems.
A.
programming
B.
upgrading
C.
modifying
55. D.
maintaining
49. ________ are a major challenge for developing information
systems.
A.
Difficulties of determining requirements
B.
Changes in requirements
C.
Scheduling difficulties
D.
All of the above
50. According to Brook's Law, adding more people to a late
system development project will:
A.
delay the project's completion
56. B.
decrease the overall cost
C.
decrease the time needed to finish
D.
add no additional coordination requirements
51. Which of the following is NOT a dimension of feasibility?
A.
Cost
B.
Schedule
C.
Time
D.
Technical
52. ________ refers to whether existing information technology
is likely to be able to meet the needs of the new system.
58. 54. Which of the following is the main activity of the
maintenance phase of the SDLC?
A.
Fix problems
B.
Program interfaces
C.
Add new components
D.
Train users