Using MIS Final Study – Flashcards
Unlock all answers in this set
Unlock answersquestion
1) Which of the following statements is true of information systems?
answer
B) Every information system has at least one application.
question
2) Which of the following statements is true about the relationship between business processes and information systems?
answer
A) A business process need not relate to any information system, but an information system relates to at least one business process.
question
3) A ________ is a person who is well versed in an organization's strategy and focuses on ensuring that business processes and information systems meet the organization's competitive strategies.
answer
A) business analyst
question
4) ________ are IS professionals who understand both business and information technology.
answer
B) Systems analysts
question
5) A ________ is a network of activities, repositories, roles, resources, and flows that interact to accomplish a business function.
answer
C) business process
question
6) In a business process, ________ are defined as collections of related tasks that receive inputs and produce outputs.
answer
A) activities
question
7) In a business process, an inventory or a database is an example of a ________.
answer
B) repository
question
8) In a business process, a role refers to ________.
answer
D) a collection of activities
question
9) In a business process, resources are ________.
answer
A) people or computer applications that are assigned to roles
question
10) In business process management (BPM), an as-is model ________.
answer
A) documents the existing business process
question
11) In business process management (BPM), once the as-is model is created, the very next step that a team must take is to ________.
answer
C) look for improvement opportunities
question
12) Which of the following are the steps in the business process management (BPM) cycle?
answer
D) model processes; create components; implement processes; assess results
question
13) Control Objectives for Information and related Technology (COBIT) is often used in the ________ stage of the business process management (BPM) cycle.
answer
C) assessment
question
14) ________ set the stage for the requirements for any information systems and applications that need to be created or adapted.
answer
D) Business process models
question
15) Which of the following can be represented using the Business Process Modeling Notation?
answer
B) as-is models
question
16) ________ is a standard set of terms and graphical notations for documenting business processes.
answer
A) Business Process Modeling Notation
question
17) Which of the following statements is true of the swim-lane layout used for modeling the business processes?
answer
B) It draws attention to the interactions among components of the diagram.
question
18) In a Business Process Modeling Notation (BPMN) diagram, a ________ symbol represents an activity.
answer
B) rectangle
question
19) In a Business Process Modeling Notation (BPMN) diagram, ________ represent decisions and usually contain a question that is answered with yes or no.
answer
A) diamonds
question
20) In a Business Process Modeling Notation (BPMN) diagram, dotted arrows depict the flow of ________ in the process.
answer
B) messages and data
question
21) In a Business Process Modeling Notation (BPMN) diagram, ________ depict the flow or sequence of activities in a process.
answer
C) solid arrows
question
22) In Business Process Modeling Notation (BPMN) diagrams, a square with a plus sign means that ________.
answer
D) an activity is considered to be a subprocess of a process
question
23) The traditional process for developing information systems is ________.
answer
B) the systems development life cycle
question
24) The first phase of the systems development life cycle (SDLC) is ________.
answer
A) defining the system
question
25) The final phase of the systems development life cycle (SDLC) is ________.
answer
C) maintaining the system
question
26) The project plan which results from defining the system is the input to ________, which is the second phase of the SDLC.
answer
C) requirements analysis
question
27) The first step in the system definition phase of the systems development life cycle (SDLC) is to ________.
answer
C) determine the goals and scope
question
28) Once the project's goals and scope have been defined, the next immediate step in the system definition phase of the SDLC is to ________.
answer
B) assess feasibility
question
29) Which of the following are the four dimensions of feasibility?
answer
C) cost, schedule, technical, and organizational feasibility
question
30) Organizational feasibility assesses ________.
answer
D) whether the new system fits within the organization's customs or legal requirements
question
31) If a defined project is determined to be feasible in the SDLC, the next immediate step is to ________.
answer
B) form the project team
question
32) During the requirements definition stage of developing an information system, the project team will consist mostly of ________.
answer
C) business and systems analysts
question
33) In the system definition phase of the SDLC, the first major task for an assembled project team is to ________.
answer
C) plan the project
question
34) Which of the following phases of the SDLC include identifying what is to be produced, how frequently, and how fast it is to be produced?
answer
A) requirements analysis
question
35) The ________ phase of the SDLC involves determining hardware and program specifications, designing the database and procedures, and creating job definitions.
answer
C) component design
question
36) Tasks in the ________ phase of the SDLC include building and testing system components and converting users to the new system.
answer
D) system implementation
question
37) A(n) ________ is a formal description of a system's response to use and misuse scenarios.
answer
C) test plan
question
38) During the system implementation phase of the SDLC, once a system has passed testing, the organization installs the new system. Which of the following terms is used to refer to this activity?
answer
B) system conversion
question
39) In the system implementation phase of the SDLC, with ________ installation, the organization implements the entire new system/business processes on a limited portion of the business.
answer
C) pilot
question
40) In the system implementation phase of the SDLC, with ________ installation, the new system runs alongside the old one until it has been tested and is fully operational.
answer
C) parallel
question
41) In the context of system implementation phase of the SDLC, a ________ installation is the riskiest because the old system is shut down and the new system is introduced.
answer
D) plunge
question
42) In the system implementation phase of the SDLC, with the ________ installation, the organization installs the next piece of the system only after the previous piece works.
answer
A) phased
question
43) Fixing a system so that it works correctly, or adapting it to changes in requirements, occurs during the ________ phase of the SDLC.
answer
B) maintenance
question
44) In systems development, documents, designs, prototypes, data models, database designs, and working data entry screens are examples of ________.
answer
D) deliverables
question
45) Project teams create a ________, which is a hierarchy of the tasks required to complete a project.
answer
B) work breakdown structure
question
46) A ________ shows the tasks, dates, and dependencies for the tasks of a project.
answer
B) Gantt chart
question
47) A ________ is a sequence of activities that determine the earliest date by which a project can be completed.
answer
C) critical path
question
48) A ________ involves balancing three critical factors: requirements, cost, and time.
answer
B) trade-off
question
49) According to Brooks' Law, adding more people to a late project will ________.
answer
C) create diseconomies of scale
question
50) The situation where addition of resources creates inefficiencies is known as ________.
answer
A) diseconomies of scale
question
51) The final work breakdown structure (WBS) plan shows planned tasks, dependencies, durations, and resource assignments. It is denoted as ________ WBS.
answer
B) baseline
question
52) The term ________ refers to a set of management policies, practices, and tools that developers use to maintain control over the SDLC project's resources.
answer
D) configuration control
question
53) The SDLC process follows a linear sequence from requirements to design to implementation. Therefore, the SDLC process is also known as the ________.
answer
A) waterfall method
question
54) Rapid application development, the unified process, extreme programming, and scrum have led to ________.
answer
C) agile development
question
55) Which of the following is true of paired programming?
answer
D) two team members share the same computer to write a computer program together
question
56) According to the scrum process, once the tasks are known for a given set of requirements, the next step is to assign each task a difficulty score, called ________.
answer
B) points
question
57) The total number of points of work a team can accomplish in each scrum period is called ________.
answer
C) velocity
question
1) Developing, operating, and maintaining an organization's computing infrastructure is a major function of the ________ department.
answer
B) information systems
question
2) Which of the following statements is true of an IS department?
answer
C) The operations group monitors user experience and responds to user problems.
question
3) If an organization runs an information system that provides little support to accounting, it's chief information officer will most likely report to the ________.
answer
B) chief executive officer
question
4) Which of the following is a responsibility of a CIO?
answer
A) reporting to the chief executive officer
question
5) Which of the following is a function of the technology office in an organization's IS department?
answer
C) investigating new information systems
question
6) In an IS department, the ________ group manages computing infrastructure, including individual computers, in-house server farms, networks, and communications media.
answer
A) operations
question
7) Which of the following statements is true of the operations group in an organization's IS department?
answer
B) It monitors the user experience and responds to their problems.
question
8) Which of the following statements is true about the "maintenance" of information systems?
answer
C) It involves adapting existing systems to support new features.
question
9) In the IS department, the ________ group manages the process of creating new information systems as well as maintaining existing information systems.
answer
C) development
question
10) If an organization does not develop programs in-house, then the development group of the IS department will be staffed primarily by ________ who work with users, operations, and vendors to acquire and install licensed software and to set up the system components around that software.
answer
C) business and systems analysts
question
11) The purpose of the ________ group is to protect data and information assets by establishing data standards and data management practices and policies.
answer
A) data administration
question
12) A ________ works with users to determine system requirements, designs and develops job descriptions and procedures, and helps determine test plans.
answer
A) system analyst
question
13) A ________ prepares program documentation, help-text, procedures, job descriptions, and training materials.
answer
D) technical writer
question
14) The responsibilities of a computer technician include ________.
answer
A) installing software and repairing networks
question
15) The responsibilities of a ________ include advising the chief information officer, executive group, and project managers on emerging technologies.
answer
D) chief technology officer
question
16) Which of the following statements is true about data administration?
answer
B) It establishes standards to protect information assets.
question
17) Which of the following is a limitation of aligning information systems with organizational strategy?
answer
A) Adapting the IS to new versions of business processes is complex and time-consuming.
question
18) The ________ is the representative for IS and IT issues within the executive staff who provides the IS perspective during discussions of problem solutions, proposals, and new initiatives.
answer
C) chief information officer
question
19) A(n) ________ is a group of senior managers from the major business functions that works with the CIO to set IS priorities and decide among major IS projects and alternatives.
answer
A) steering committee
question
20) Which of the following is a function of the steering committee for an IS department?
answer
D) setting IS priorities
question
21) Which of the following statements is true about the steering committee of an IS department?
answer
D) The steering committee's meetings are conducted by the IS department.
question
22) Which of the following statements is true about IS planning functions?
answer
D) The CEO and other executive staff decide the membership of the steering committee.
question
23) ________ is the process of hiring another organization to perform a service.
answer
B) Outsourcing
question
24) One of the reasons outsourcing is undertaken is to ________.
answer
C) cap an organization's financial exposure
question
25) Which of the following statements is true about outsourcing?
answer
B) It saves both direct and indirect management time.
question
26) An outsource vendor changes its strategic direction. Under which of the following outsourcing risks can this be associated?
answer
D) loss of control
question
27) Which of the following statements is a characteristic of outsourcing?
answer
C) To achieve quality, it is easier to hire another vendor than it is to rehire internal staff.
question
28) ________ is a form of outsourcing.
answer
C) Acquiring licensed software
question
29) Which of the following is a form of outsourcing hardware infrastructure exclusively?
answer
B) IaaS cloud hosting
question
30) Which of the following is an outsourcing alternative in which hardware and both operating system and application software are leased?
answer
C) Software as a Service (SaaS)
question
31) Which of the following is an example of outsourcing an entire business function?
answer
C) outsourcing the function of arranging employee travel
question
32) In 2005, Marrion International chose a human resources consulting agency to handle its human resource needs for the next 7 years. This is an example of ________ outsourcing.
answer
C) business function
question
33) When a company outsources a system, control over prioritizing fixes for software failures and problems belongs to the ________.
answer
B) quality vendor
question
34) Which of the following is a risk of outsourcing IS/IT functions?
answer
C) It involves the potential loss of intellectual capital.
question
35) Every IS user has a right to a secure computing environment. This means that ________.
answer
A) the organization should protect his/her computer and its files
question
36) Which of the following is a right of users of information systems?
answer
C) receiving effective training
question
37) Which of the following is generally a responsibility of users of information systems?
answer
D) following security and backup procedures
question
38) Which of the following statements is true about users of information systems?
answer
C) They should learn standard techniques and procedures for the applications they use.
question
39) Users should not bother IS personnel for trivial issues, instead they should fulfill their responsibilities by ________.
answer
A) learning basic computer skills
question
40) Which of the following statements is true about the changes and developments foreseen by the year 2024?
answer
B) Most organizations will move their internal hardware infrastructure into the cloud.
question
1) A ________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally, without the owner's permission and often without the owner's knowledge.
answer
C) threat
question
2) Which of the following is considered a threat caused by human error?
answer
A) an employee inadvertently installs an old database on top of the current one
question
3) Which of the following is considered a computer crime?
answer
D) hacking of information systems
question
4) ________ occurs when someone deceives by pretending to be someone else.
answer
D) Pretexting
question
5) When referring to security threats, pretexting, sniffing, spoofing, and phishing are all examples of ________.
answer
A) unauthorized data disclosure
question
6) A ________ pretends to be a legitimate company and sends an email requesting confidential data, such as account numbers, Social Security numbers, account passwords, and so forth.
answer
B) phisher
question
7) Email spoofing is a synonym for ________.
answer
B) phishing
question
8) ________ is a technique for intercepting computer communications, either through a physical connection to a network or without a physical connection in the case of wireless networks.
answer
C) Sniffing
question
9) ________ take computers with wireless connections through an area and search for unprotected wireless networks and then monitor and intercept wireless traffic at will.
answer
C) Drive-by sniffers
question
10) Which of the following is an example of a sniffing technique?
answer
D) adware
question
11) ________ occurs when a person breaks into a network to steal data such as customer lists, product inventory data, employee data, and other proprietary and confidential data.
answer
C) Hacking
question
12) Which of the following is most likely to be a result of hacking?
answer
C) an unauthorized transaction from a user's credit card
question
13) ________ occurs through human error when employees do not follow proper procedures or when procedures have not been well designed.
answer
B) Incorrect data modification
question
14) ________ is the type of security loss that involves computer criminals invading a computer system and replacing legitimate programs with their own unauthorized ones that shut down legitimate applications and substitute their own processing to spy, steal, and manipulate data.
answer
D) Usurpation
question
15) Which of the following usually happens in a malicious denial-of-service attack?
answer
B) a hacker floods a Web server with millions of bogus service requests
question
16) ________ present the largest risk for an organization's infrastructure loss.
answer
B) Natural disasters
question
17) Which of the following statements is true about losses due to computer security threats?
answer
B) Some organizations don't report all their computer crime losses, and some won't report such losses at all.
question
18) A(n) ________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
answer
A) intrusion detection system
question
19) Nonword passwords are vulnerable to a ________ attack, in which the password cracker tries every possible combination of characters.
answer
C) brute force
question
20) ________ are small files that the browser stores on the user's computer when he/she visits Web sites and enables him/her to access Web sites without having to sign in every time.
answer
A) Cookies
question
21) Removing and disabling ________, which may contain sensitive security data, presents an excellent example of the trade-off between improved security and cost.
answer
C) cookies
question
22) Which of the following is a critical security function that the senior management should address in an organization?
answer
C) establishing the security policy
question
23) In information security, which of the following is true of managing risk?
answer
B) Organizations should implement safeguards that balance the trade-off between risk and cost.
question
24) Which of the following was passed to give individuals the right to access their own health data created by doctors and other healthcare providers?
answer
C) the HIPAA of 1996
question
25) Which of the following is classified as a technical safeguard?
answer
B) firewalls
question
26) A(n) ________ has a microchip in it to hold data.
answer
B) smart card
question
27) Users of smart cards are required to enter a ________ to be authenticated.
answer
C) personal identification number
question
28) Which of the following is used for biometric authentication?
answer
B) facial features
question
29) Which of the following statements is true of biometric identification?
answer
D) It often faces resistance from users for its invasive nature.
question
30) A ________ is a number used to encrypt data.
answer
A) key
question
31) In asymmetric encryption, each site has a ________ for encoding messages.
answer
C) public key
question
32) With ________, the sender and receiver transmit a message using different keys.
answer
A) asymmetric encryption
question
33) Secure Socket Layer is also known as ________.
answer
B) transport layer security
question
34) Which of the following statements is true of the Secure Socket Layer (SSL)?
answer
B) It is used to send sensitive data such as credit card numbers.
question
35) Mark is transferring funds online through the Web site of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
answer
C) https
question
36) A ________ examines each part of a message and determines whether to let that part pass.
answer
A) packet-filtering firewall
question
37) Packet-filtering firewalls ________.
answer
A) can filter both inbound and outbound traffic
question
38) ________ is the term used to denote viruses, worms, and Trojan horses.
answer
A) Malware
question
39) A virus is a computer program that replicates itself. The program code that causes unwanted activity is called the ________.
answer
A) payload
question
40) ________ are viruses that masquerade as useful programs or files.
answer
C) Trojan horses
question
41) A ________ is a type of virus that propagates using the Internet or other computer networks.
answer
A) worm
question
42) ________ is similar to spyware but it watches user activity and produces pop-ups.
answer
B) Adware
question
43) Which of the following is likely to be accepted by a poorly designed application, leading to improper disclosure of data?
answer
D) SQL injection
question
44) ________ refers to an organization-wide function that is in charge of developing data policies and enforcing data standards.
answer
A) Data administration
question
45) ________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.
answer
B) Database administration
question
46) Which of the following statements is true of data administration?
answer
D) It is involved in establishing data safeguards.
question
47) Key escrow is a(n) ________.
answer
B) safety procedure that allows a trusted party to have a copy of the encryption key
question
48) ________ protect databases and other organizational data.
answer
C) Data safeguards
question
49) The computers that run the DBMS and all devices that store database data should reside in locked, controlled-access facilities. This is done to ________.
answer
D) provide physical security
question
50) Which of the following statements is true with regard to human safeguards?
answer
C) Documenting position sensitivity enables security personnel to prioritize their activities based on possible risk.
question
51) ________ involve the people and procedure components of information systems.
answer
C) Human safeguards
question
52) Which of the following statements is true about human safeguards for employees?
answer
B) User accounts should be defined to give users the least possible privilege necessary to perform their jobs.
question
53) When an employee is terminated, IS administrators should receive advance notice so that they can ________.
answer
D) remove the user account and password
question
54) ________ a Web site means to take extraordinary measures to reduce a system's vulnerability, using special versions of the operating system.
answer
B) Hardening
question
55) The process of hardening a Web site is a ________ safeguard.
answer
C) technical
question
56) ________ are the primary means of authentication and are important not just for access to a user's computer, but also for authentication to other networks and servers to which the user may have access.
answer
C) Passwords
question
57) Which of the following systems procedures is specifically the responsibility of operations personnel?
answer
C) creating back up of system databases
question
58) ________ involves accomplishing job tasks during failure.
answer
D) Recovery
question
59) Firewalls produce ________ which include lists of all dropped packets, infiltration attempts, and unauthorized access attempts from within the firewall.
answer
C) activity logs
question
60) ________ are false targets for computer criminals to attack.
answer
Honeypots
question
1. Which of the following principles of competitive advantage is associated with product implementations?
answer
B) differentiating service offerings
question
1. According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion?
answer
B) rewarding accomplishment
question
1. Which of the following statements is true of business process designs?
answer
A) Most process designs require people to work in new ways.
question
1. Which of the following is considered information rather than mere data?
answer
B) the return on investment of an advertising campaign
question
1. Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
answer
A) inbound logistics
question
1. ________ decisions are decisions that support day-to-day activities.
answer
A) Operational
question
1. Which of the following is a component of an information system, but not of information technology?
answer
C) people
question
1. ________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
answer
D) Experimentation
question
1. ________ is the activity of two or more people working together to achieve a common goal, result, or work product.
answer
C) Collaboration
question
1. According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
answer
A) bargaining power
question
1. Which of the following is a critical characteristic of good information?
answer
B) accuracy
question
1. The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
answer
B) people
question
1. One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project.
answer
C) doing
question
1. Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
answer
D) outbound logistics
question
1. The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
answer
B) strategic
question
1. ________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
answer
B) Systems thinking
question
1. A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
A) planning
question
1. Abstract reasoning is the ability to ________.
answer
B) make and manipulate models
question
1. Which of the following statements is true of managing tasks?
answer
B) No benefit will come from the task list unless every task has a date by which it is to be completed.
question
1. ________ decisions are those that support broad-scope, organizational issues.
answer
B) Strategic
question
1. Who among the following are most likely to use asynchronous communication?
answer
A) members of a team who work in different time zones
question
1. The difference between the total value added and the total costs incurred is called the ________ of the value chain.
answer
B) total margin
question
1. Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
answer
B) inbound logistics
question
1. A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
answer
A) business process
question
1. Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password?
answer
A) He should request the coworker to type in the password on the system without Jeff looking at it.
question
Identify the open source DBMS product among the following.
answer
A) MySQL
question
The rows in a database are called ________.
answer
A) records
question
Which of the following features distinguishes a LAN from a WAN?
answer
A) LAN connects computers in a single location.
question
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly.
answer
C) network
question
The connection between a VPN client and a VPN server is called a(n) ________.
answer
C) tunnel
question
________ in an E-R diagram refer to the least number of entities required in a relationship.
answer
D) Minimum cardinalities
question
Which of the following terms refers to a collection of servers?
answer
B) server farm
question
A primary key used in a database is a ________.
answer
B) column or group of columns that identifies a unique row in a table
question
Compared to in-house hosting, cloud-based hosting ________.
answer
B) minimizes the risk of investing in technology that will soon become obsolete
question
Which of the following is an international standard language for processing a database?
answer
C) SQL
question
Which of the following characteristics is a disadvantage of cloud-based hosting?
answer
A) It involves high dependency on vendor.
question
Which of the following is a computer architecture and instruction set that is designed for portable devices such as phones and tablets?
answer
C) ARM
question
________ is used to install and update software, back up and restore mobile devices, wipe employer software and data from devices, report usage, and provide other mobile device management data.
answer
A) MDM software
question
Which of the following is a function of an ISP?
answer
B) It serves as a gateway to the Internet.
question
________ is the process of converting a poorly-structured table into two or more well-structured tables.
answer
B) Normalization
question
Which of the following is an example of an application program?
answer
A) Microsoft Word
question
Which of the following is an example of storage hardware in computers?
answer
B) magnetic disk
question
A ________ is a collection of forms, reports, queries, and programs that serves as an intermediary between users and database data.
answer
A) database application
question
A ________ is a set of rules that programs on two communicating devices follow.
answer
D) protocol
question
________ is the term used to describe data collections that are characterized by huge volume, rapid velocity, and great variety.
answer
A) BigData
question
A(n) ________ is a request for data from a database.
answer
C) query
question
Which of the following memory devices is volatile in nature?
answer
B) cache
question
In a data model, a(n) ________ is something that a user wants to track.
answer
C) entity
question
The ________ is sometimes called "the brain" of the computer.
answer
D) central processing unit
question
A(n) ________ is a number that identifies a particular device.
answer
B) IP address
question
Which of the following principles of competitive advantage is associated with product implementations?
answer
B) differentiating service offerings
question
According to Hackman's three criteria for team success, which of the following IS requirements will be categorized under the meaningful and satisfying experience criterion?
answer
B) rewarding accomplishment
question
Which of the following statements is true of business process designs?
answer
A) Most process designs require people to work in new ways.
question
Which of the following is considered information rather than mere data?
answer
B) the return on investment of an advertising campaign
question
Identify the activity in the value chain that involves receiving and handling of raw materials and other inputs to the product.
answer
A) inbound logistics
question
________ decisions are decisions that support day-to-day activities.
answer
A) Operational
question
Which of the following is a component of an information system, but not of information technology?
answer
C) people
question
________ refers to making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the resources one has.
answer
D) Experimentation
question
________ is the activity of two or more people working together to achieve a common goal, result, or work product.
answer
C) Collaboration
question
According to Porter's five forces model, a group of grain farmers in a surplus year will have reduced ________.
answer
A) bargaining power
question
Which of the following is a critical characteristic of good information?
answer
B) accuracy
question
The ________ component of the five-component framework of an information system includes individuals who maintain the data and support the networks of computers.
answer
B) people
question
One of the procedures of a collaboration project is documenting and reporting progress. This is performed in the ________ phase of the project.
answer
C) doing
question
Lynn, the manager of a transportation company, is goes through the week's delivery schedule. She calls her team and assigns territories for each executive. She contacts the fleet supervisor to arrange trucks for transportation. Which activity of the value chain is Lynn executing?
answer
D) outbound logistics
question
The directors of a company meet to decide if they should start a new product line or not. This is an example of a(n) ________ decision.
answer
B) strategic
question
________ is the ability to model the components of a system, to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed.
answer
B) Systems thinking
question
A project manager defines the tasks that her team members have to perform and determines the schedule for carrying out each of the tasks. This project is in the ________ phase of project management.
answer
A) planning
question
Abstract reasoning is the ability to ________.
answer
B) make and manipulate models
question
Which of the following statements is true of managing tasks?
answer
B) No benefit will come from the task list unless every task has a date by which it is to be completed.
question
________ decisions are those that support broad-scope, organizational issues.
answer
B) Strategic
question
Who among the following are most likely to use asynchronous communication?
answer
A) members of a team who work in different time zones
question
The difference between the total value added and the total costs incurred is called the ________ of the value chain.
answer
B) total margin
question
Streamtech, a manufacturer of automobiles, recently received a patent for an unmanned search boat. By doing this, Streamtech has ________.
answer
A) created an entry barrier
question
A(n) ________ is a network of activities that generate value by transforming inputs into outputs.
answer
A) business process
question
Jeff is the IT manager of his organization. He needs to use his coworker's account to access some information. In keeping with password etiquette, how should he go about getting his coworker's password?
answer
A) He should request the coworker to type in the password on the system without Jeff looking at it.