ITMG 100 Exam One Version J FALL 2019

 

Name ________________________________________

This is a closed book, closed notes exam—although you are allowed to use one 8 ½ X 11 page of notes.  This sheet must be turned in with your exam and with your name printed on it. This exam is worth 100 points. You have exactly 1 hour and 20 minutes in which to complete this exam.

Good Luck!

Associated Students Academic Integrity Statement

“I pledge that I have neither given nor received any unauthorized assistance on this examination”

 

_____________________________________

MULTIPLE CHOICE (1.25 point each) Fill in your answers on the scantron sheet provided.

 

1.

The fact that you practice continuous computing means all of the following except:

 

A)

You can pull information about almost everything from anywhere all the time.

 

B)

Your daily routines are the same as students 20 years ago, but you can do your tasks much more quickly and with less effort.

 

C)

You can push your ideas to the Web.

 

D)

You are surrounded by a movable information network.

 

2.

IT personnel use _____ to produce _____.

 

A)

IT infrastructure, IT platform

 

B)

computer-based information systems, IT architecture

 

C)

IT components, IT services

 

D)

IT infrastructure, IT architecture

 

3.

_____ relates to any computer-based tool that people use to work with information and to support the information processing needs of the organization.

 

A)

Information technology architecture

 

B)

Information technology infrastructure

 

C)

Information technology

 

D)

An information system

 

E)

A Computer-Based Information System

 

4.

_____ deal(s) with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing.

 

A)

Information technology

 

B)

IT architecture

 

C)

IT services

 

D)

IT infrastructure

 

E)

Management information systems

 

5.

Which of the following is TRUE of the IS function today?

 

A)

It should only be managed by end users.

 

B)

It is not the exclusive responsibility of the IS department.

 

C)

It should only be managed by the IS department.

 

D)

None of the above are true since the IS function is an outdated term.

 

6.

Which of the following is a traditional function of the MIS department?

 

A)

Educating non-MIS managers about IT

 

B)

Creating business alliances

 

C)

Initiating and designing strategic IS

 

D)

Staffing, training, and developing IS skills

 

7.

IT __________ be used to create a competitive advantage ___________.

 

A)

can; when it is used effectively

 

B)

cannot; even when it is used effectively

 

C)

cannot; because everyone has access to technology

 

D)

can; because everyone has access to technology

 

8.

In the following table, column A is _____, column B is _____, and column C is ______.

 

72 mph in a 70 mph speed zone

72

Safe driver discounts offered

45 mph in a 25 mph speed zone

45

Potential for school zone/residential area tickets

99 mph in a 55 mph speed zone

99

City driving in Chicago/Atlanta (going with the flow of traffic) versus a small city (reckless endangerment)

 

 

A)

information; data; knowledge

 

B)

knowledge; information; data

 

C)

knowledge; data; information

 

D)

information; knowledge; data

 

 

9.

IT changes managers' job by _________

 

A)

making it easier to get all employees to work from one location.

 

B)

improving an employee's sense of connectedness.

 

C)

decreasing the volume of information they have to process.

 

D)

providing near real-time information so managers can make quicker decisions.

 

10.

Fantasy sports websites ________ exempt from the 2006 Unlawful Internet Gambling Enforcement Act because they are considered games of ________

 

A)

are; luck

 

B)

are; skill

 

C)

are not; luck

 

D)

are not; skill

 

11.

Which of the following is TRUE?

 

A)

Computerization reduces our level of isolation.

 

B)

IT increases the number of middle managers.

 

C)

Managers have more time to make decisions

 

D)

Remote supervision will probably become a norm.

 

12.

________ is NOT a problem caused by computers.

 

A)

Carpal Tunnel Syndrome

 

B)

Ergonomics

 

C)

Job Stress

 

D)

Repetitive strain injuries

 

 

 

13.

A competitive advantage refers to any ___________ that provide an organization with an edge against its ___________ in some measure such as cost, quality, or speed.

 

A)

assets; competitors

 

B)

costs; customers

 

C)

assets; customers

 

D)

costs; competitors

 

14.

Which of the following is an example of an efficiency metric?

 

A)

Good work environment

 

B)

Helpful customer service

 

C)

High-quality products

 

D)

Short customer wait-times

 

15.

Chevron initially utilized ___________ to improve their supply chain, followed by employee-driven ________ initiatives, and then adopted a unified _____ approach to standardize business processes.

 

A)

BPS, BPR, BPM

 

B)

BPM, BPI, BPR

 

C)

BPI, BPM, BPR

 

D)

BPR, BPI, BPM

 

 

 

16.

Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.

 

A)

high, low

 

B)

low, high

 

C)

low, low

 

D)

high, the same

 

E)

low, the same

 

17.

If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____.

 

A)

many, high

 

B)

few, high

 

C)

few, negligible

 

D)

many, few

 

E)

few, few

 

18.

Porter's _____ help(s) companies identify general strategies, where his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact.

 

A)

competitive forces model, value chain model

 

B)

primary activities, support activities

 

C)

value chain model, support activities

 

D)

value chain model, competitive forces model

 

E)

competitive forces model, primary activities

 

19.

Southwest Airlines' low-cost, short-haul strategy is an example of which strategy for competitive advantage?

 

A)

differentiation

 

B)

cost leadership

 

C)

innovation

 

D)

customer-orientation

 

E)

operational effectiveness

 

20.

Improving the manner in which internal business processes are executed is which strategy for competitive advantage?

 

A)

operational effectiveness

 

B)

customer orientation

 

C)

cost leadership

 

D)

differentiation

 

E)

innovation

 

21.

Wal-Mart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

 

A)

differentiation

 

B)

cost leadership

 

C)

operational effectiveness

 

D)

innovation

 

E)

customer-orientation

 

 

22.

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

 

A)

operational effectiveness

 

B)

innovation

 

C)

differentiation

 

D)

customer-orientation

 

E)

cost leadership

 

23.

Which of the following is NOT a requirement of TPSs?

 

A)

Must ensure overlapping updates can't occur

 

B)

Have to efficiently handle large variations in volumes of data

 

C)

Must maximize downtime

 

D)

Must record results accurately and securely

 

                                                                                                                                        

24.

Bar code scanners are an example of ______________________.

 

A)

Batch processing

 

B)

OLAP

 

C)

OLTP

 

D)

Source data automation

 

25.

Drill-down reports ___________.

 

A)

include only information that falls outside certain threshold standards

 

B)

compare data

 

C)

display a greater level of detail

 

D)

summarize the performance of critical activities

 

26.

Key indicator reports ___________.

 

A)

include only information that falls outside certain threshold standards

 

B)

display a greater level of detail

 

C)

summarize the performance of critical activities

 

D)

compare data

 

27.

ERP address information silos by _____________.

 

A)

simplifying system creation

 

B)

reducing the amount of information presented

 

C)

integrating functional areas

 

D)

correcting a lack of communication between TPSs

 

28.

In the _____, the production process begins with a forecast.

 

A)

pull model

 

B)

supply chain model

 

C)

push model

 

D)

inventory model

 

E)

vertical integration model

 

29.

In the _____, the production process begins with a customer order.

 

A)

inventory model

 

B)

pull model

 

C)

push model

 

D)

supply chain model

 

E)

vertical integration model

 

30.

The _____ is erratic shifts in orders up and down the supply chain.

 

A)

bullwhip effect

 

B)

demand forecast effect

 

C)

customer coordination effect

 

D)

supply forecast effect

 

E)

inventory effect

 

29.

Which of the following is not a problem along the supply chain?

 

A)

extra cost of expediting shipments

 

B)

decreased cycle times

 

C)

poor customer service

 

D)

loss of revenues

 

E)

high inventory costs

 

31.

Customers are in the ____________ component of the supply chain.

 

A)

Intraorganizational

 

B)

Upstream

 

C)

Downstream

 

D)

Internal

 

32.

_________________ flows are the physical products, raw materials, and suppliers that flow along the chain.

 

A)

Financial

 

B)

Material

 

C)

Supplier

 

D)

Information

 

33.

Sourcing or procurement occurs in the ____________ component of the supply chain.

 

A)

Internal

 

B)

Downstream

 

C)

Upstream

 

D)

Intraorganizational

 

34.

You order a pair of shoes online but they don't fit.  You send them back.  This is an example of a(n) ________ transaction.

 

A)

Upstream

 

B)

Downstream

 

C)

Intraorganizational

 

D)

Internal

 

35.

SCM helps address which of Porter's Five Forces?

 

A)

Rivalry

 

B)

Threat of substitutes

 

C)

Supplier power

 

D)

Buyer power

 

36.

CRM is most essential for ____________ businesses.

 

A)

Small

 

B)

Medium

 

C)

Large

 

D)

All of the above

 

37.

______________________ is the percentage of customers that will be lost over time.

 

A)

Customer churn

 

B)

Customer intimacy

 

C)

Lifetime loss

 

D)

Lifetime value

 

38.

CRM helps address which of Porter's Five Forces?

 

A)

Supplier power

 

B)

Rivalry

 

C)

Threat of substitutes

 

D)

Buyer power

 

39.

Customer relationship has become _____________ personal with the rapid growth of the Internet and the World Wide Web.

 

A)

It has become irrelevant

 

B)

Less

 

C)

There has been no change

 

D)

More

 

40.

Chapter 2. It’s about Business. _________ is NOT a benefit of the NASCAR app.

 

A)

digital notes

 

B)

fewer violations

 

C)

highlighted violations

 

D)

quick access to the rulebook

 

 

 

 

41.

You decide it's finally time to get a new TV.  You go to Best Buy to check out your options.  One of the Best Buy sales representatives points out that the largest TV they have also has the most amazing picture quality.  Even though you didn't want a TV that big, you decide it's worth it for the better picture quality.  The sales representative's technique is called ______________________.

 

A)

Bundling

 

B)

Cross-selling

 

C)

Up-selling

 

D)

None of the above – this is unethical behavior

 

42.

The purpose of loyalty programs is to ____________.

 

A)

increase buyer power

 

B)

influence future behavior

 

C)

decrease the threat of substitute products

 

D)

reward past behavior

 

43.

The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________.

 

A)

steal credit card numbers

 

B)

stop the release of the move The Interview

 

C)

sell social security numbers

 

D)

threaten the US government

 

44.

_________ is any danger to which a system may be exposed.

 

A)

Exposure

 

B)

Security

 

C)

Information security

 

D)

Threat

 

45.

_________ is the possibility that the system will be harmed by a threat.

 

A)

Exposure

 

B)

Threat

 

C)

Security

 

D)

Vulnerability

 

46.

Which of the following is FALSE?

 

A)

Thumb drives make it easy to steal huge amounts of sensitive information.

 

B)

It is easier to be a hacker nowadays.

 

C)

Management doesn't always support security efforts.

 

D)

Mainframes make it easy to communicate freely and seamlessly with everyone.

 

47.

Which of the following is NOT one of the most dangerous employees to information security?

 

A)

Accountants

 

B)

HR employees

 

C)

Janitors

 

D)

MIS employees

 

48.

Spam costs US companies _________ of dollars per year.

 

A)

hundreds

 

B)

millions

 

C)

billions

 

D)

trillions

 

49.

In a process called _____, a company allows nothing to run unless it is approved, where in a process called _____, the company allows everything to run unless it is not approved.

 

A)

Encryption, whitelisting

 

B)

Whitelisting, encryption

 

C)

Encryption, blacklisting

 

D)

Whitelisting, blacklisting

 

E)

Blacklisting, whitelisting

 

50.

SCADA attacks typically occur on ___________.

 

A)

Personal computers

 

B)

Hacker networks

 

C)

Industrial control systems

 

D)

Government networks

 

51.

Biometrics is something the user _______.

 

A)

Is

 

B)

Has

 

C)

Knows

 

D)

Does

 

52.

Risk _______________ means absorbing any damages that occur.

 

A)

acceptance

 

B)

analysis

 

C)

limitation

 

D)

transference

 

53.

IT’s about Business 4.1 The Houston Astros contacted the _________ to investigate a security breach in 2014.

 

A)

CIA

 

B)

FBI

 

C)

MLB

 

D)

NCAA

 

54.

Your liability with credit cards is typically _____, where your liability with debit cards is _____?

 

A)

the amount in your bank account, your credit limit

 

B)

the amount in your bank account, zero

 

C)

your credit limit, zero

 

D)

your credit limit, the amount in your bank account

 

E)

zero, the amount in your bank account

 

55.

Personal firewalls perform all of the following functions except:

 

A)

They should block outbound connections that you do not initiate.

 

B)

They should seek out the origin of malware in an attempt to block it in the future.

 

C)

They should make your computer invisible.

 

D)

They should alert you to suspicious behavior.

 

E)

They should tell you when a program or connection is attempting to do something that you do not want.

 

56.

Methods you should use to protect your portable devices and information include all of the following except

 

A)

keep your portable devices in an inconspicuous container

 

B)

encrypt the hard drive of your laptop

 

C)

use two-factor authentication

 

D)

do not leave your portable devices in plain view in a car

 

E)

all of the above

 

57.

Opening Case Chapter 9. Teespring is an example of _________.

 

A)

make-to-production

 

B)

make-to-stock

 

C)

mass customization

 

D)

mass production

 

 

58.

________ does NOT use a peer-to-peer business model

 

A)

Airbnb

 

B)

Craiglist

 

C)

eBay

 

D)

Twitter

 

59.

________ are an example of harnessing collective intelligence.

 

A)

Mashups

 

B)

Tags

 

C)

Web Services

 

D)

Wikis

 

60.

__________ feature remixable applications and data

 

A)

Mashups

 

B)

Tags

 

C)

Web Services

 

D)

Wikis

 

61.

________ is an example of a social, collaborative, industrial robot.

 

A)

Baxter

 

B)

Lowebot

 

C)

Mybot

 

D)

Watson

 

62.

IT’s about Business 4.2 Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised.

 

A)

50; do

 

B)

50; do not

 

C)

95; do

 

D)

95; do not

 

63.

Opening Case Chapter 3. Marriott developed a strategy to address falling revenues from _________ but got fined for implementing this strategy.

 

A)

the honor bar

 

B)

internet access

 

C)

phone calls

 

D)

room service

 

64.

If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the _________ approach as an ethical framework.

 

A)

utilitarian

 

B)

common good

 

C)

rights

 

D)

fairness

 

65.

At your company, you put the highest priority on making sure customer credit card information cannot be breached.  This means you are using the __________ approach as an ethical framework.

 

A)

common good

 

B)

utilitarian

 

C)

fairness

 

D)

rights

 

66.

At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis.  This means most women and physically disabled people will not be able to apply for the job.  In this case, you are using the __________ approach as an ethical framework.

 

A)

rights

 

B)

common good

 

C)

fairness

 

D)

utilitarian

 

67.

Welfare and Obamacare follow the __________ approach as an ethical framework..

 

A)

utilitarian

 

B)

fairness

 

C)

common good

 

D)

rights

 

68.

Knowing what kind of surveillance an employer can use on its employees is a(n) _________ issue.

 

A)

Property

 

B)

Accessibility

 

C)

Privacy

 

D)

Accuracy

 

69.

Making sure your customer's information is correct in your information systems is a(n) _________ issue.

 

A)

Accuracy

 

B)

Accessibility

 

C)

Property

 

D)

Privacy

 

70.

Determining whether or not corporate computers can be used for private purposes is a(n) _________ issue.

 

A)

Property

 

B)

Accessibility

 

C)

Privacy

 

D)

Accuracy

 

71.

Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n) _________ issue.

 

A)

Property

 

B)

Accessibility

 

C)

Privacy

 

D)

Accuracy

 

72.

Cheating is ________ common at business schools ____________ tools like Turnitin.

 

A)

less; because of

 

B)

more; even with

 

C)

less; even with

 

D)

more; because of

 

73.

The right of privacy ___________ absolute.

 

A)

cannot be

 

B)

is not

 

C)

is

 

D)

can be

 

74.

The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

 

A)

digital dossier policy

 

B)

opt-out model of informed consent

 

C)

information privacy policy

 

D)

opt-in model of informed consent

 

75.

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

 

A)

opt-out model of informed consent

 

B)

information privacy policy

 

C)

digital dossier policy

 

D)

opt-in model of informed consent

 

76.

Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________.

 

A)

acceptance

 

B)

avoidance

 

C)

limitation

 

D)

transference

 

77.

_________ is the result of optimizing and aligning business processes to fulfill customers’ needs, wants, and desires

 

A)

Customer satisfaction

 

B)

Differentiation

 

C)

Productivity

 

D)

Quality

 

78.

Which of the following is a risk of social commerce?

 

A)

Problem identification

 

B)

Quality of comments

 

C)

Brand awareness

 

D)

None of the above are risks

 

79.

One key feature of __________________ is the ability to remix applications and data.

 

A)

Web 2.0

 

B)

Web 3.0

 

C)

Web 1.0

 

D)

None of the above

 

80.

One risk of social media is that ________ percent of individuals contribute __________ of the content.

 

A)

only 20; 80

 

B)

90; only 10

 

C)

only 10; 90

 

D)

80; only 20