ITMG 100 Exam One Version S FALL 2019

 

Name ________________________________________

This is a closed book, closed notes exam—although you are allowed to use one 8 ½ X 11 page of notes.  This sheet must be turned in with your exam and with your name printed on it. This exam is worth 100 points. You have exactly 1 hour and 20 minutes in which to complete this exam.

Good Luck!

Associated Students Academic Integrity Statement

“I pledge that I have neither given nor received any unauthorized assistance on this examination”

 

_____________________________________

MULTIPLE CHOICE (1.25 point each) Fill in your answers on the scantron sheet provided.

 

1.

The fact that you practice continuous computing means all of the following except:

 

A)

Your daily routines are the same as students 20 years ago, but you can do your tasks much more quickly and with less effort.

 

B)

You are surrounded by a movable information network.

 

C)

You can pull information about almost everything from anywhere all the time.

 

D)

You can push your ideas to the Web.

 

2.

IT personnel use _____ to produce _____.

 

A)

IT infrastructure, IT architecture

 

B)

IT infrastructure, IT platform

 

C)

computer-based information systems, IT architecture

 

D)

IT components, IT services

 

3.

_____ relates to any computer-based tool that people use to work with information and to support the information processing needs of the organization.

 

A)

Information technology infrastructure

 

B)

Information technology

 

C)

An information system

 

D)

A Computer-Based Information System

 

E)

Information technology architecture

 

4.

_____ deal(s) with the planning for – and the development, management, and use of – technology to help people perform their tasks related to information processing.

 

A)

IT infrastructure

 

B)

Management information systems

 

C)

IT architecture

 

D)

IT services

 

E)

Information technology

 

5.

Which of the following is TRUE of the IS function today?

 

A)

It is not the exclusive responsibility of the IS department.

 

B)

It should only be managed by the IS department.

 

C)

It should only be managed by end users.

 

D)

None of the above are true since the IS function is an outdated term.

 

 

 

6.

Which of the following is a traditional function of the MIS department?

 

A)

Initiating and designing strategic IS

 

B)

Educating non-MIS managers about IT

 

C)

Staffing, training, and developing IS skills

 

D)

Creating business alliances

 

7.

IT __________ be used to create a competitive advantage ___________.

 

A)

cannot; even when it is used effectively

 

B)

cannot; because everyone has access to technology

 

C)

can; because everyone has access to technology

 

D)

can; when it is used effectively

 

8.

In the following table, column A is _____, column B is _____, and column C is ______.

 

72 mph in a 70 mph speed zone

72

Safe driver discounts offered

45 mph in a 25 mph speed zone

45

Potential for school zone/residential area tickets

99 mph in a 55 mph speed zone

99

City driving in Chicago/Atlanta (going with the flow of traffic) versus a small city (reckless endangerment)

 

 

A)

knowledge; information; data

 

B)

information; knowledge; data

 

C)

information; data; knowledge

 

D)

knowledge; data; information

 

9.

IT changes managers' job by _________

 

A)

decreasing the volume of information they have to process.

 

B)

providing near real-time information so managers can make quicker decisions.

 

C)

improving an employee's sense of connectedness.

 

D)

making it easier to get all employees to work from one location.

 

10.

Fantasy sports websites ________ exempt from the 2006 Unlawful Internet Gambling Enforcement Act because they are considered games of ________

 

A)

are; luck

 

B)

are; skill

 

C)

are not; luck

 

D)

are not; skill

 

11.

A competitive advantage refers to any ___________ that provide an organization with an edge against its ___________ in some measure such as cost, quality, or speed.

 

A)

assets; customers

 

B)

costs; competitors

 

C)

costs; customers

 

D)

assets; competitors

 

12.

Which of the following is an example of an efficiency metric?

 

A)

Helpful customer service

 

B)

Short customer wait-times

 

C)

Good work environment

 

D)

High-quality products

 

13.

Chevron initially utilized ___________ to improve their supply chain, followed by employee-driven ________ initiatives, and then adopted a unified _____ approach to standardize business processes.

 

A)

BPM, BPI, BPR

 

B)

BPR, BPI, BPM

 

C)

BPS, BPR, BPM

 

D)

BPI, BPM, BPR

 

 

 

14.

Buyer power is _____ when buyers have many choices from whom to buy and _____ when buyers have few choices.

 

A)

low, the same

 

B)

high, the same

 

C)

high, low

 

D)

low, low

 

E)

low, high

 

15.

If there are _____ substitutes for an organization's products or services, then the threat of substitutes is _____.

 

A)

few, few

 

B)

few, negligible

 

C)

many, high

 

D)

few, high

 

E)

many, few

 

16.

Porter's _____ help(s) companies identify general strategies, where his _____ help(s) to identify specific activities where companies can use the strategies for greatest impact.

 

A)

primary activities, support activities

 

B)

value chain model, support activities

 

C)

value chain model, competitive forces model

 

D)

competitive forces model, primary activities

 

E)

competitive forces model, value chain model

 

17.

Southwest Airlines' low-cost, short-haul strategy is an example of which strategy for competitive advantage?

 

A)

innovation

 

B)

customer-orientation

 

C)

operational effectiveness

 

D)

differentiation

 

E)

cost leadership

 

18.

Improving the manner in which internal business processes are executed is which strategy for competitive advantage?

 

A)

customer orientation

 

B)

innovation

 

C)

operational effectiveness

 

D)

cost leadership

 

E)

differentiation

 

19.

Wal-Mart's automatic replenishment system, which enables the company to reduce inventory storage requirements, is an example of which strategy for competitive advantage?

 

A)

operational effectiveness

 

B)

customer-orientation

 

C)

cost leadership

 

D)

differentiation

 

E)

innovation

 

20.

The introduction of ATM machines by Citibank was a classic example of which strategy for competitive advantage?

 

A)

customer-orientation

 

B)

differentiation

 

C)

cost leadership

 

D)

innovation

 

E)

operational effectiveness

 

21.

Which of the following is NOT a requirement of TPSs?

 

A)

Must record results accurately and securely

 

B)

Must ensure overlapping updates can't occur

 

C)

Have to efficiently handle large variations in volumes of data

 

D)

Must maximize downtime

 

22.

Bar code scanners are an example of ______________________.

 

A)

OLTP

 

B)

Batch processing

 

C)

Source data automation

 

D)

OLAP

 

23.

Drill-down reports ___________.

 

A)

display a greater level of detail

 

B)

include only information that falls outside certain threshold standards

 

C)

summarize the performance of critical activities

 

D)

compare data

 

24.

Key indicator reports ___________.

 

A)

display a greater level of detail

 

B)

summarize the performance of critical activities

 

C)

compare data

 

D)

include only information that falls outside certain threshold standards

 

25.

ERP address information silos by _____________.

 

A)

reducing the amount of information presented

 

B)

correcting a lack of communication between TPSs

 

C)

simplifying system creation

 

D)

integrating functional areas

 

26.

In the _____, the production process begins with a forecast.

 

A)

inventory model

 

B)

push model

 

C)

vertical integration model

 

D)

supply chain model

 

E)

pull model

 

27.

In the _____, the production process begins with a customer order.

 

A)

pull model

 

B)

vertical integration model

 

C)

inventory model

 

D)

push model

 

E)

supply chain model

 

28.

The _____ is erratic shifts in orders up and down the supply chain.

 

A)

customer coordination effect

 

B)

inventory effect

 

C)

demand forecast effect

 

D)

bullwhip effect

 

E)

supply forecast effect

 

29.

Which of the following is not a problem along the supply chain?

 

A)

decreased cycle times

 

B)

poor customer service

 

C)

high inventory costs

 

D)

extra cost of expediting shipments

 

E)

loss of revenues

 

30.

Customers are in the ____________ component of the supply chain.

 

A)

Upstream

 

B)

Downstream

 

C)

Internal

 

D)

Intraorganizational

 

31.

_________________ flows are the physical products, raw materials, and suppliers that flow along the chain.

 

A)

Information

 

B)

Supplier

 

C)

Financial

 

D)

Material

 

32.

Sourcing or procurement occurs in the ____________ component of the supply chain.

 

A)

Intraorganizational

 

B)

Upstream

 

C)

Internal

 

D)

Downstream

 

33.

You order a pair of shoes online but they don't fit.  You send them back.  This is an example of a(n) ________ transaction.

 

A)

Internal

 

B)

Intraorganizational

 

C)

Upstream

 

D)

Downstream

 

34.

SCM helps address which of Porter's Five Forces?

 

A)

Supplier power

 

B)

Buyer power

 

C)

Threat of substitutes

 

D)

Rivalry

 

35.

CRM is most essential for ____________ businesses.

 

A)

Large

 

B)

Small

 

C)

Medium

 

D)

All of the above

 

36.

______________________ is the percentage of customers that will be lost over time.

 

A)

Customer intimacy

 

B)

Lifetime loss

 

C)

Lifetime value

 

D)

Customer churn

 

37.

CRM helps address which of Porter's Five Forces?

 

A)

Rivalry

 

B)

Threat of substitutes

 

C)

Buyer power

 

D)

Supplier power

 

38.

Customer relationship has become _____________ personal with the rapid growth of the Internet and the World Wide Web.

 

A)

There has been no change

 

B)

It has become irrelevant

 

C)

More

 

D)

Less

 

39.

Chapter 2. It’s about Business. _________ is NOT a benefit of the NASCAR app.

 

A)

digital notes

 

B)

fewer violations

 

C)

highlighted violations

 

D)

quick access to the rulebook

 

 

 

40.

You decide it's finally time to get a new TV.  You go to Best Buy to check out your options.  One of the Best Buy sales representatives points out that the largest TV they have also has the most amazing picture quality.  Even though you didn't want a TV that big, you decide it's worth it for the better picture quality.  The sales representative's technique is called ______________________.

 

A)

Up-selling

 

B)

Bundling

 

C)

Cross-selling

 

D)

None of the above – this is unethical behavior

 

41.

The purpose of loyalty programs is to ____________.

 

A)

influence future behavior

 

B)

decrease the threat of substitute products

 

C)

reward past behavior

 

D)

increase buyer power

 

42.

The main purpose for the attack on Sony Picture Entertainment on November 24, 2014 was to __________.

 

A)

stop the release of the move The Interview

 

B)

sell social security numbers

 

C)

threaten the US government

 

D)

steal credit card numbers

 

43.

_________ is any danger to which a system may be exposed.

 

A)

Security

 

B)

Threat

 

C)

Exposure

 

D)

Information security

 

44.

_________ is the possibility that the system will be harmed by a threat.

 

A)

Security

 

B)

Exposure

 

C)

Vulnerability

 

D)

Threat

 

45.

Which of the following is FALSE?

 

A)

Mainframes make it easy to communicate freely and seamlessly with everyone.

 

B)

Management doesn't always support security efforts.

 

C)

Thumb drives make it easy to steal huge amounts of sensitive information.

 

D)

It is easier to be a hacker nowadays.

 

46.

Which of the following is NOT one of the most dangerous employees to information security?

 

A)

MIS employees

 

B)

Janitors

 

C)

Accountants

 

D)

HR employees

 

47.

Spam costs US companies _________ of dollars per year.

 

A)

hundreds

 

B)

millions

 

C)

billions

 

D)

trillions

 

48.

In a process called _____, a company allows nothing to run unless it is approved, where in a process called _____, the company allows everything to run unless it is not approved.

 

A)

Whitelisting, encryption

 

B)

Encryption, blacklisting

 

C)

Whitelisting, blacklisting

 

D)

Blacklisting, whitelisting

 

E)

Encryption, whitelisting

 

49.

SCADA attacks typically occur on ___________.

 

A)

Industrial control systems

 

B)

Government networks

 

C)

Hacker networks

 

D)

Personal computers

 

50.

Biometrics is something the user _______.

 

A)

Knows

 

B)

Does

 

C)

Has

 

D)

Is

 

51.

Risk _______________ means absorbing any damages that occur.

 

A)

analysis

 

B)

limitation

 

C)

transference

 

D)

acceptance

 

52.

IT’s about Business 4.1 The Houston Astros contacted the _________ to investigate a security breach in 2014.

 

A)

CIA

 

B)

FBI

 

C)

MLB

 

D)

NCAA

 

53.

Your liability with credit cards is typically _____, where your liability with debit cards is _____?

 

A)

zero, the amount in your bank account

 

B)

your credit limit, zero

 

C)

your credit limit, the amount in your bank account

 

D)

the amount in your bank account, your credit limit

 

E)

the amount in your bank account, zero

 

54.

Personal firewalls perform all of the following functions except:

 

A)

They should alert you to suspicious behavior.

 

B)

They should block outbound connections that you do not initiate.

 

C)

They should tell you when a program or connection is attempting to do something that you do not want.

 

D)

They should make your computer invisible.

 

E)

They should seek out the origin of malware in an attempt to block it in the future.

 

55.

Methods you should use to protect your portable devices and information include all of the following except

 

A)

do not leave your portable devices in plain view in a car

 

B)

keep your portable devices in an inconspicuous container

 

C)

encrypt the hard drive of your laptop

 

D)

use two-factor authentication

 

E)

all of the above

 

56.

Which of the following is TRUE?

 

A)

Computerization reduces our level of isolation.

 

B)

IT increases the number of middle managers.

 

C)

Managers have more time to make decisions

 

D)

Remote supervision will probably become a norm.

 

57.

Opening Case Chapter 9. Teespring is an example of _________.

 

A)

make-to-production

 

B)

make-to-stock

 

C)

mass customization

 

D)

mass production

 

 

58.

________ does NOT use a peer-to-peer business model

 

A)

Airbnb

 

B)

Craiglist

 

C)

eBay

 

D)

Twitter

 

59.

________ are an example of harnessing collective intelligence.

 

A)

Mashups

 

B)

Tags

 

C)

Web Services

 

D)

Wikis

 

60.

__________ feature remixable applications and data

 

A)

Mashups

 

B)

Tags

 

C)

Web Services

 

D)

Wikis

 

61.

________ is an example of a social, collaborative, industrial robot.

 

A)

Baxter

 

B)

Lowebot

 

C)

Mybot

 

D)

Watson

 

62.

Computer technologies become obsolete _________ other organizational technologies.

 

A)

irrelevantly different than

 

B)

more quickly than

 

C)

at the same time as

 

D)

less often than

 

63.

Opening Case Chapter 3. Marriott developed a strategy to address falling revenues from _________ but got fined for implementing this strategy.

 

A)

the honor bar

 

B)

internet access

 

C)

phone calls

 

D)

room service

 

64.

If you are most concerned about generating the highest profits margins to ensure your stockholders are getting the highest return on their investment, you would be using the _________ approach as an ethical framework.

 

A)

rights

 

B)

utilitarian

 

C)

fairness

 

D)

common good

 

65.

At your company, you put the highest priority on making sure customer credit card information cannot be breached.  This means you are using the __________ approach as an ethical framework.

 

A)

utilitarian

 

B)

rights

 

C)

common good

 

D)

fairness

 

66.

At your shipping company, the job description for a new position states the applicant must be able to lift packages over 50 pounds on a consistent basis.  This means most women and physically disabled people will not be able to apply for the job.  In this case, you are using the __________ approach as an ethical framework.

 

A)

fairness

 

B)

rights

 

C)

utilitarian

 

D)

common good

 

67.

Welfare and Obamacare follow the __________ approach as an ethical framework..

 

A)

rights

 

B)

common good

 

C)

utilitarian

 

D)

fairness

 

68.

Knowing what kind of surveillance an employer can use on its employees is a(n) _________ issue.

 

A)

Privacy

 

B)

Property

 

C)

Accuracy

 

D)

Accessibility

                                                                                                                                              

69.

Making sure your customer's information is correct in your information systems is a(n) _________ issue.

 

A)

Property

 

B)

Privacy

 

C)

Accessibility

 

D)

Accuracy

 

70.

Determining whether or not corporate computers can be used for private purposes is a(n) _________ issue.

 

A)

Accuracy

 

B)

Privacy

 

C)

Property

 

D)

Accessibility

 

71.

Determining whether or not you are allowed to sell your customers' information to a telemarketer is a(n) _________ issue.

 

A)

Accuracy

 

B)

Property

 

C)

Accessibility

 

D)

Privacy

 

72.

Cheating is ________ common at business schools ____________ tools like Turnitin.

 

A)

less; even with

 

B)

more; because of

 

C)

more; even with

 

D)

less; because of

 

73.

The right of privacy ___________ absolute.

 

A)

is not

 

B)

can be

 

C)

cannot be

 

D)

is

 

74.

The _________ permits the company to collect personal information until the customer specifically requests that the data not be collected.

 

A)

opt-out model of informed consent

 

B)

opt-in model of informed consent

 

C)

digital dossier policy

 

D)

information privacy policy

 

75.

The _________ prohibits an organization from collecting any personal information unless the customer specifically authorizes it.

 

A)

opt-in model of informed consent

 

B)

digital dossier policy

 

C)

opt-out model of informed consent

 

D)

information privacy policy

 

76.

Your company hires FireEye to install security software and monitor your systems. This is an example of risk _________.

 

A)

acceptance

 

B)

avoidance

 

C)

limitation

 

D)

transference

 

77.

_________ is the result of optimizing and aligning business processes to fulfill customers’ needs, wants, and desires

 

A)

Customer satisfaction

 

B)

Differentiation

 

C)

Productivity

 

D)

Quality

 

78.

Which of the following is a risk of social commerce?

 

A)

Problem identification

 

B)

Quality of comments

 

C)

Brand awareness

 

D)

None of the above are risks

 

79.

One key feature of __________________ is the ability to remix applications and data.

 

A)

Web 2.0

 

B)

Web 3.0

 

C)

Web 1.0

 

D)

None of the above

 

80.

One risk of social media is that ________ percent of individuals contribute __________ of the content.

 

A)

only 20; 80

 

B)

90; only 10

 

C)

only 10; 90

 

D)

80; only 20