Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
These systems employ the most advanced graphics software and can present graphs and data
from many sources.
a) decision-support systems.
b) transaction processing systems.
c) management information systems.
d) executive information systems.
e) Office Automation System
2. When the output of some units can be used as inputs to other units, or if two organizations
pool markets and expertise that result in lower costs and generate profits it is often referred to
as creating.
a) switching costs.
b) synergies.
c) low-cost producer strategies.
d) digital strategies.
e) competitive advantages
3. These systems are especially suited to situations in which the procedure for arriving at a
solution may not be fully predefined in advance.
a) knowledge management systems.
b) decision-support systems.
c) transaction processing systems.
d) management information systems.
e) Supply chain management
5. The greatest difficulty of bringing about organizational change - especially the development of
new information systems -is.
a) computerizing manual systems.
b) political resistance.
c) recruiting qualified employees.
d) perceiving environmental change.
e) none of the above
6. When a large firm uses an extranet to link to its suppliers and other key business partners, a(n)
________ is created.
a) web marketplace
b) channels center
c) private industrial network
d) intranet
e) None of the above
7. Investments in new business processes, management behavior, or training to enhance returns
on information technology investments are called ______________________
a) social capital
b) business investments
c) organizational and management capital
d) organizational investments
e) None of the above
8. The use of the Internet and digital technology to execute all of the activities in the enterprise is
referred to as: _______
a) electronic business.
b) digital processes.
c) digital business.
d) electronic commerce.
e) electronic process
9. Which of the following would not be classified as a management activity in the business
information value chain? _______
a) disseminating
b) controlling
c) coordinating
d) planning
e) all of the above
10. The application of the Internet and related technologies to digitally enable government and
public sector agencies' relationships with citizens, businesses, and other arms of government is
called: _______
a) e-government.
b) e-commerce.
c) e-technology.
d) e-business.
e) none of the above
11. These systems allow users to change assumptions, ask new questions, and include new data:
a) executive information systems.
b) decision-support systems.
c) management information systems.
d) transaction processing systems.
e) none of the above
13. Compensation analysis and training and development are examples of: ______
a) human resources information systems.
b) sales and marketing information systems.
c) finance and accounting information systems.
d) enterprise application information systems.
e) none of the above
14. A (an) ________ collects data from various key business processes and stores the data in a
single comprehensive data repository, usable by other parts of the business. ______
a) automatic reporting system
b) management information system
c) transaction system
d) enterprise system
e) none of the above
15. ________ are designed to support organization-wide process coordination and integration.
a) enterprise applications
b) strategic planning operations
c) decision-support systems
d) management information systems
e) none of the above
16. CAD, machine control, and facilities location are examples of: ______
a) enterprise application information systems.
b) sales and marketing information systems.
c) manufacturing and production information systems.
d) finance and accounting information systems.
e) none of the above
17. Collections of routines for producing goods and services are referred to as: ______
a) mediating factors.
b) work with routine tasks.
c) standard reporting procedures.
d) business processes.
e) none of the above
19. The greatest difficulty of bringing about organizational changeespecially the development
of new information systemsis: ______
a) recruiting qualified employees.
b) perceiving environmental change.
c) computerizing manual systems.
d) political resistance.
e) none of the above
20. According to the ________ model of human behavior, an individual identifies goals, ranks all
possible alternatives actions by their contributions to those goals, and chooses the alternative
that contributes most to those goals. ______
a) decisional model
b) choice model
c) rational model
d) hierarchical
e) none of the above
21. The ________ model is used to describe the interaction of external influences, specifically
threats and opportunities that affect an organization's strategy and ability to compete. ______
a) strategic transitions
b) environmental conditions
c) network economics
d) competitive forces
e) none of the above
25. The driving force behind the explosion of electronic business and the emergence of the digital
firm is: ______
a) new business models.
b) the low-cost connectivity and universal standards provided by internet technology.
c) TCP/IP.
d) the emergence of a worldwide global economy, which cannot be affected by politics.
e) none of the above
26. Which of the following is stress induced by computer use, and its symptoms include
aggravation, hostility toward humans, impatience, and enervation? ______
a) technostress
b) carpal tunnel syndrome
c) computer stress
d) techno aggravation
e) none of the above
27. Accepting the potential costs, duties, and obligations for the decisions you make is referred to
as:
a) due process.
b) liability.
c) responsibility.
d) accountability.
e) none of the above
29. Which software company would not be classified as one of the largest providers of enterprise
application software? ______
a) Peoplesoft
b) Macromedia
c) SAP
d) Oracle
e) none of the above
30. Which of the following refers to the ability of a computer, product, or system to expand to
serve a larger number of users without breaking down? ______
a) scalability
b) expandability
c) disintermediation
d) modifiability
e) none of the above
31. Unix and Linux constitute the backbone of corporate infrastructure throughout much of the
world. Which one of the following options does not apply to this statement? ______
a) they are scalable.
b) they are more expensive than mainframe operating systems.
c) they are reliable.
d) they are less expensive than mainframe operating systems.
e) none of the above
32. The formal language programmers use to specify the content and structure of the database is
the: ______
a) structured query language.
b) data dictionary language.
c) data definition language.
d) data manipulation language.
e) none of the above
33. The confusion created by ________ makes it difficult for companies to create customer
relationship management, supply chain management, or enterprise systems that integrate
data from different sources. ______
a) online processing
b) data redundancy
c) batch processing
d) data independence
e) none of the above
36. The part of a network that handles the major traffic is: _____
a) backbone.
b) multiplexer.
c) front end.
d) network interface.
e) none of the above
37. In the Domain Name System, the domain immediately below the root domain is the: _____
a) state domain.
b) final destination.
c) top-level domain.
d) IP address.
e) none of the above
38. The total amount of digital information that can be transmitted through any
telecommunications medium is measured in: _____
a) baud.
b) gigaflops.
c) hertz.
d) bps.
e) none of the above
39. Internet security challenges for the server during communication include: _____
a) tapping, sniffing, message alteration.
b) copying of data, alteration of data, loss of machine.
c) theft and fraud.
d) computer viruses, line taps, hacking.
e) none of the above
42. Knowledge that resides in the minds of employees that has not been documented is called:
_____
a) tacit knowledge.
b) standard operating procedures.
c) corporate culture.
d) organizational memory.
e) none of the above
43. To automate routine tasks to help firms search for and filter information for use in electronic
commerce and supply chain management a firm would most likely use: _____
a) intelligent agents.
b) virtual reality systems.
c) fuzzy logic systems.
d) CAD systems.
e) none of the above
45. The use of computers to combine data from multiple sources and creating electronic dossiers
of detailed information on individuals is called: _____
a) safe harbor.
b) invasion.
c) spamming.
d) profiling.
e) none of the above
47. Using numerous computers to inundate and overwhelm the network from numerous launch points is
called a: _____
a) cybervandalism.
b) worm
c) trojan horse.
d) DDoS.
e) none of the above
48. The more any given resource is applied to production, the lower the marginal gain in output,
until a point is reached where the additional inputs produce no additional output is referred
to as:_____
a) inelasticity.
b) the law of diminishing returns.
c) supply and demand.
d) the point of no return.
e) none of the above
50. Sets of operating instructions that direct and control computer processing are called: _____
a) protocols
b) computer programs
c) policies
d) procedures
e) none of the above