Name ________________________________________
This is a closed book, closed notes exam—although you are allowed to use one 8 ½ X 11 page of notes. This sheet must be turned in with your exam and with your name printed on it. This exam is worth 100 points. You have exactly 1 hour and 20 minutes in which to complete this exam.
Good Luck!
Associated Students Academic Integrity Statement
“I pledge that I have neither given nor received any unauthorized assistance on this examination”
_____________________________________
MULTIPLE CHOICE (1.25 point each) Fill in your answers on the scantron sheet provided.
1. |
The fact that you practice continuous computing means all of the following except: |
|
|
A) |
You can pull information about almost everything from anywhere all the time. |
|
B) |
Your daily routines are the same as students 20 years ago, but you can do your tasks much more quickly and with less effort. |
|
C) |
You can push your ideas to the Web. |
|
D) |
You are surrounded by a movable information network. |
2. |
IT personnel use _____ to produce _____. |
|
|
A) |
IT infrastructure, IT platform |
|
B) |
computer-based information systems, IT architecture |
|
C) |
IT components, IT services |
|
D) |
IT infrastructure, IT architecture |
3. |
_____ relates to any computer-based tool that people use to work with information and to support the information processing needs of the organization. |
|
|
A) |
Information technology architecture |
|
B) |
Information technology infrastructure |
|
C) |
Information technology |
|
D) |
An information system |
|
E) |
A Computer-Based Information System |
4. |
_____ deal(s) with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing. |
|
|
A) |
Information technology |
|
B) |
IT architecture |
|
C) |
IT services |
|
D) |
IT infrastructure |
|
E) |
Management information systems |
5. |
Which of the following is TRUE of the IS function today? |
|
|
A) |
It should only be managed by end users. |
|
B) |
It is not the exclusive responsibility of the IS department. |
|
C) |
It should only be managed by the IS department. |
|
D) |
None of the above are true since the IS function is an outdated term. |
6. |
Which of the following is a traditional function of the MIS department? |
|
|
A) |
Educating non-MIS managers about IT |
|
B) |
Creating business alliances |
|
C) |
Initiating and designing strategic IS |
|
D) |
Staffing, training, and developing IS skills |
7. |
IT __________ be used to create a competitive advantage ___________. |
|
|
A) |
can; when it is used effectively |
|
B) |
cannot; even when it is used effectively |
|
C) |
cannot; because everyone has access to technology |
|
D) |
can; because everyone has access to technology |
8. |
In the following table, column A is _____, column B is _____, and column C is ______.
|
||||||||||
|
A) |
information; data; knowledge |
|||||||||
|
B) |
knowledge; information; data |
|||||||||
|
C) |
knowledge; data; information |
|||||||||
|
D) |
information; knowledge; data |
9. |
IT changes managers' job by _________ |
|
|
A) |
making it easier to get all employees to work from one location. |
|
B) |
improving an employee's sense of connectedness. |
|
C) |
decreasing the volume of information they have to process. |
|
D) |
providing near real-time information so managers can make quicker decisions. |
10. |
Fantasy sports websites ________ exempt from the 2006 Unlawful Internet Gambling Enforcement Act because they are considered games of ________ |
|
|
A) |
are; luck |
|
B) |
are; skill |
|
C) |
are not; luck |
|
D) |
are not; skill |
11. |
Which of the following is TRUE? |
|
|
A) |
Computerization reduces our level of isolation. |
|
B) |
IT increases the number of middle managers. |
|
C) |
Managers have more time to make decisions |
|
D) |
Remote supervision will probably become a norm. |
12. |
________ is NOT a problem caused by computers. |
|
|
A) |
Carpal Tunnel Syndrome |
|
B) |
Ergonomics |
|
C) |
Job Stress |
|
D) |
Repetitive strain injuries |
13. |
A competitive advantage refers to any ___________ that provide an organization with an edge against its ___________ in some measure such as cost, quality, or speed. |
|
|
A) |
assets; competitors |
|
B) |
costs; customers |
|
C) |
assets; customers |
|
D) |
costs; competitors |
14. |
Which of the following is an example of an efficiency metric? |
|
|
A) |
Good work environment |
|
B) |
Helpful customer service |
|
C) |
High-quality products |
|
D) |
Short customer wait-times |
15. |
Chevron initially utilized ___________ to improve their supply chain, followed by employee-driven ________ initiatives, and then adopted a unified _____ approach to standardize business processes. |
|
|
A) |
BPS, BPR, BPM |
|
B) |
BPM, BPI, BPR |
|
C) |
BPI, BPM, BPR |
|
D) |
BPR, BPI, BPM |
16. |
Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices. |
|
|
A) |
high, low |
|
B) |
low, high |
|
C) |
low, low |
|
D) |
high, the same |
|
E) |
low, the same |
17. |
If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____. |
|
|
A) |
many, high |
|
B) |
few, high |
|
C) |
few, negligible |
|
D) |
many, few |
|
E) |
few, few |
18. |
Porter's _____ help(s) companies identify general strategies, where his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact. |
|
|
A) |
competitive forces model, value chain model |
|
B) |
primary activities, support activities |
|
C) |
value chain model, support activities |
|
D) |
value chain model, competitive forces model |
|
E) |
competitive forces model, primary activities |
19. |
Southwest Airlines' low-cost, short-haul strategy is an example of which strategy for competitive advantage? |
|
|
A) |
differentiation |
|
B) |
cost leadership |
|
C) |
innovation |
|
D) |
customer-orientation |
|
E) |
operational effectiveness |
20. |
Improving the manner in which internal business processes are executed is which strategy for competitive advantage? |
|
|
A) |
operational effectiveness |
|
B) |
customer orientation |
|
C) |
cost leadership |
|
D) |
differentiation |
|
E) |
innovation |
21. |
Wal-Mart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage? |
|
|
A) |
differentiation |
|
B) |
cost leadership |
|
C) |
operational effectiveness |
|
D) |
innovation |
|
E) |
customer-orientation |
22. |
The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage? |
|
|
A) |
operational effectiveness |
|
B) |
innovation |
|
C) |
differentiation |
|
D) |
customer-orientation |
|
E) |
cost leadership |
23. |
Which of the following is NOT a requirement of TPSs? |
|
|
A) |
Must ensure overlapping updates can't occur |
|
B) |
Have to efficiently handle large variations in volumes of data |
|
C) |
Must maximize downtime |
|
D) |
Must record results accurately and securely |
24. |
Bar code scanners are an example of ______________________. |
|
|
A) |
Batch processing |
|
B) |
OLAP |
|
C) |
OLTP |
|
D) |
Source data automation |
25. |
Drill-down reports ___________. |
|
|
A) |
include only information that falls outside certain threshold standards |
|
B) |
compare data |
|
C) |
display a greater level of detail |
|
D) |
summarize the performance of critical activities |
26. |
Key indicator reports ___________. |
|
|
A) |
include only information that falls outside certain threshold standards |
|
B) |
display a greater level of detail |
|
C) |
summarize the performance of critical activities |
|
D) |
compare data |
27. |
ERP address information silos by _____________. |
|
|
A) |
simplifying system creation |
|
B) |
reducing the amount of information presented |
|
C) |
integrating functional areas |
|
D) |
correcting a lack of communication between TPSs |
28. |
In the _____, the production process begins with a forecast. |
|
|
A) |
pull model |
|
B) |
supply chain model |
|
C) |
push model |
|
D) |
inventory model |
|
E) |
vertical integration model |
29. |
In the _____, the production process begins with a customer order. |
|
|
A) |
inventory model |
|
B) |
pull model |
|
C) |
push model |
|
D) |
supply chain model |
|
E) |
vertical integration model |
30. |
The _____ is erratic shifts in orders up and down the supply chain. |
|
|
A) |
bullwhip effect |
|
B) |
demand forecast effect |
|
C) |
customer coordination effect |
|
D) |
supply forecast effect |
|
E) |
inventory effect |
29. |
Which of the following is not a problem along the supply chain? |
|
|
A) |
extra cost of expediting shipments |
|
B) |
decreased cycle times |
|
C) |
poor customer service |
|
D) |
loss of revenues |
|
E) |
high inventory costs |
31. |
Customers are in the ____________ component of the supply chain. |
|
|
A) |
Intraorganizational |
|
B) |
Upstream |
|
C) |
Downstream |
|
D) |
Internal |
32. |
_________________ flows are the physical products, raw materials, and suppliers that flow along the chain. |
|
|
A) |
Financial |
|
B) |
Material |
|
C) |
Supplier |
|
D) |
Information |
33. |
Sourcing or procurement occurs in the ____________ component of the supply chain. |
|
|
A) |
Internal |
|
B) |
Downstream |
|
C) |
Upstream |
|
D) |
Intraorganizational |
34. |
You order a pair of shoes online but they don't fit. You send them back. This is an example of a(n) ________ transaction. |
|
|
A) |
Upstream |
|
B) |
Downstream |
|
C) |
Intraorganizational |
|
D) |
Internal |
35. |
SCM helps address which of Porter's Five Forces? |
|
|
A) |
Rivalry |
|
B) |
Threat of substitutes |
|
C) |
Supplier power |
|
D) |
Buyer power |
36. |
CRM is most essential for ____________ businesses. |
|
|
A) |
Small |
|
B) |
Medium |
|
C) |
Large |
|
D) |
All of the above |
37. |
______________________ is the percentage of customers that will be lost over time. |
|
|
A) |
Customer churn |
|
B) |
Customer intimacy |
|
C) |
Lifetime loss |
|
D) |
Lifetime value |
38. |
CRM helps address which of Porter's Five Forces? |
|
|
A) |
Supplier power |
|
B) |
Rivalry |
|
C) |
Threat of substitutes |
|
D) |
Buyer power |
39. |
Customer relationship has become _____________ personal with the rapid growth of the Internet and the World Wide Web. |
|
|
A) |
It has become irrelevant |
|
B) |
Less |
|
C) |
There has been no change |
|
D) |
More |
40. |
Chapter 2. It’s about Business. _________ is NOT a benefit of the NASCAR app. |
|
|
A) |
digital notes |
|
B) |
fewer violations |
|
C) |
highlighted violations |
|
D) |
quick access to the rulebook |
41. |
You decide it's finally time to get a new TV. You go to Best Buy to check out your options. One of the Best Buy sales representatives points out that the largest TV they have also has the most amazing picture quality. Even though you didn't want a TV that big, you decide it's worth it for the better picture quality. The sales representative's technique is called ______________________. |
|
|
A) |
Bundling |
|
B) |
Cross-selling |
|
C) |
Up-selling |
|
D) |
None of the above – this is unethical behavior |
42. |
The purpose of loyalty programs is to ____________. |
|
|
A) |
increase buyer power |
|
B) |
influence future behavior |
|
C) |
decrease the threat of substitute products |
|
D) |
reward past behavior |
43. |
The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________. |
|
|
A) |
steal credit card numbers |
|
B) |
stop the release of the move The Interview |
|
C) |
sell social security numbers |
|
D) |
threaten the US government |
44. |
_________ is any danger to which a system may be exposed. |
|
|
A) |
Exposure |
|
B) |
Security |
|
C) |
Information security |
|
D) |
Threat |
45. |
_________ is the possibility that the system will be harmed by a threat. |
|
|
A) |
Exposure |
|
B) |
Threat |
|
C) |
Security |
|
D) |
Vulnerability |
46. |
Which of the following is FALSE? |
|
|
A) |
Thumb drives make it easy to steal huge amounts of sensitive information. |
|
B) |
It is easier to be a hacker nowadays. |
|
C) |
Management doesn't always support security efforts. |
|
D) |
Mainframes make it easy to communicate freely and seamlessly with everyone. |
47. |
Which of the following is NOT one of the most dangerous employees to information security? |
|
|
A) |
Accountants |
|
B) |
HR employees |
|
C) |
Janitors |
|
D) |
MIS employees |
48. |
Spam costs US companies _________ of dollars per year. |
|
|
A) |
hundreds |
|
B) |
millions |
|
C) |
billions |
|
D) |
trillions |
49. |
In a process called _____, a company allows nothing to run unless it is approved, where in a process called _____, the company allows everything to run unless it is not approved. |
|
|
A) |
Encryption, whitelisting |
|
B) |
Whitelisting, encryption |
|
C) |
Encryption, blacklisting |
|
D) |
Whitelisting, blacklisting |
|
E) |
Blacklisting, whitelisting |
50. |
SCADA attacks typically occur on ___________. |
|
|
A) |
Personal computers |
|
B) |
Hacker networks |
|
C) |
Industrial control systems |
|
D) |
Government networks |
51. |
Biometrics is something the user _______. |
|
|
A) |
Is |
|
B) |
Has |
|
C) |
Knows |
|
D) |
Does |
52. |
Risk _______________ means absorbing any damages that occur. |
|
|
A) |
acceptance |
|
B) |
analysis |
|
C) |
limitation |
|
D) |
transference |
53. |
IT’s about Business 4.1 The Houston Astros contacted the _________ to investigate a security breach in 2014. |
|
|
A) |
CIA |
|
B) |
FBI |
|
C) |
MLB |
|
D) |
NCAA |
54. |
Your liability with credit cards is typically _____, where your liability with debit cards is _____? |
|
|
A) |
the amount in your bank account, your credit limit |
|
B) |
the amount in your bank account, zero |
|
C) |
your credit limit, zero |
|
D) |
your credit limit, the amount in your bank account |
|
E) |
zero, the amount in your bank account |
55. |
Personal firewalls perform all of the following functions except: |
|
|
A) |
They should block outbound connections that you do not initiate. |
|
B) |
They should seek out the origin of malware in an attempt to block it in the future. |
|
C) |
They should make your computer invisible. |
|
D) |
They should alert you to suspicious behavior. |
|
E) |
They should tell you when a program or connection is attempting to do something that you do not want. |
56. |
Methods you should use to protect your portable devices and information include all of the following except |
|
|
A) |
keep your portable devices in an inconspicuous container |
|
B) |
encrypt the hard drive of your laptop |
|
C) |
use two-factor authentication |
|
D) |
do not leave your portable devices in plain view in a car |
|
E) |
all of the above |
57. |
Opening Case Chapter 9. Teespring is an example of _________. |
|
|
A) |
make-to-production |
|
B) |
make-to-stock |
|
C) |
mass customization |
|
D) |
mass production |
58. |
________ does NOT use a peer-to-peer business model |
|
|
A) |
Airbnb |
|
B) |
Craiglist |
|
C) |
eBay |
|
D) |
|
59. |
________ are an example of harnessing collective intelligence. |
|
|
A) |
Mashups |
|
B) |
Tags |
|
C) |
Web Services |
|
D) |
Wikis |
60. |
__________ feature remixable applications and data |
|
|
A) |
Mashups |
|
B) |
Tags |
|
C) |
Web Services |
|
D) |
Wikis |
61. |
________ is an example of a social, collaborative, industrial robot. |
|
|
A) |
Baxter |
|
B) |
Lowebot |
|
C) |
Mybot |
|
D) |
Watson |
62. |
IT’s about Business 4.2 Almost _________ percent of ransomware victims pay the ransom and hackers _________ decrypt the data as promised. |
|
|
A) |
50; do |
|
B) |
50; do not |
|
C) |
95; do |
|
D) |
95; do not |
63. |
Opening Case Chapter 3. Marriott developed a strategy to address falling revenues from _________ but got fined for implementing this strategy. |
|
|
A) |
the honor bar |
|
B) |
internet access |
|
C) |
phone calls |
|
D) |
room service |
64. |
If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the _________ approach as an ethical framework. |
|
|
A) |
utilitarian |
|
B) |
common good |
|
C) |
rights |
|
D) |
fairness |
65. |
At your company, you put the highest priority on making sure customer credit card information cannot be breached. This means you are using the __________ approach as an ethical framework. |
|
|
A) |
common good |
|
B) |
utilitarian |
|
C) |
fairness |
|
D) |
rights |
66. |
At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis. This means most women and physically disabled people will not be able to apply for the job. In this case, you are using the __________ approach as an ethical framework. |
|
|
A) |
rights |
|
B) |
common good |
|
C) |
fairness |
|
D) |
utilitarian |
67. |
Welfare and Obamacare follow the __________ approach as an ethical framework.. |
|
|
A) |
utilitarian |
|
B) |
fairness |
|
C) |
common good |
|
D) |
rights |
68. |
Knowing what kind of surveillance an employer can use on its employees is a(n) _________ issue. |
|
|
A) |
Property |
|
B) |
Accessibility |
|
C) |
Privacy |
|
D) |
Accuracy |
69. |
Making sure your customer's information is correct in your information systems is a(n) _________ issue. |
|
|
A) |
Accuracy |
|
B) |
Accessibility |
|
C) |
Property |
|
D) |
Privacy |
70. |
Determining whether or not corporate computers can be used for private purposes is a(n) _________ issue. |
|
|
A) |
Property |
|
B) |
Accessibility |
|
C) |
Privacy |
|
D) |
Accuracy |
71. |
Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n) _________ issue. |
|
|
A) |
Property |
|
B) |
Accessibility |
|
C) |
Privacy |
|
D) |
Accuracy |
72. |
Cheating is ________ common at business schools ____________ tools like Turnitin. |
|
|
A) |
less; because of |
|
B) |
more; even with |
|
C) |
less; even with |
|
D) |
more; because of |
73. |
The right of privacy ___________ absolute. |
|
|
A) |
cannot be |
|
B) |
is not |
|
C) |
is |
|
D) |
can be |
74. |
The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected. |
|
|
A) |
digital dossier policy |
|
B) |
opt-out model of informed consent |
|
C) |
information privacy policy |
|
D) |
opt-in model of informed consent |
75. |
The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it. |
|
|
A) |
opt-out model of informed consent |
|
B) |
information privacy policy |
|
C) |
digital dossier policy |
|
D) |
opt-in model of informed consent |
76. |
Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________. |
|
|
A) |
acceptance |
|
B) |
avoidance |
|
C) |
limitation |
|
D) |
transference |
77. |
_________ is the result of optimizing and aligning business processes to fulfill customers’ needs, wants, and desires |
|
|
A) |
Customer satisfaction |
|
B) |
Differentiation |
|
C) |
Productivity |
|
D) |
Quality |
78. |
Which of the following is a risk of social commerce? |
|
|
A) |
Problem identification |
|
B) |
Quality of comments |
|
C) |
Brand awareness |
|
D) |
None of the above are risks |
79. |
One key feature of __________________ is the ability to remix applications and data. |
|
|
A) |
Web 2.0 |
|
B) |
Web 3.0 |
|
C) |
Web 1.0 |
|
D) |
None of the above |
80. |
One risk of social media is that ________ percent of individuals contribute __________ of the content. |
|
|
A) |
only 20; 80 |
|
B) |
90; only 10 |
|
C) |
only 10; 90 |
|
D) |
80; only 20 |