CVS refers to
a) eyestrain related to computer display screen use
b) carpal vision syndrome
c) wrist injuries brought about by incorrect hand position...
______ can be induced by tens of thousands of repetitions under low-impact loads.
______ can be induced by tens of thousands of repetitions under low-impact loads.
a) CTS
b) CVS
c) RSI
d) technostress
Answer: ...
The term "_______ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
The term "_______ divide" refers to large disparities in access to computers and the Internet among different social groups and different locations.
a)...
Re-designing and automating business processes can be seen as a double-edged sword because
Re-designing and automating business processes can be seen as a double-edged sword because
a) increases in efficiency may be accompanied by job losses
b)...
Which of the five moral dimensions of the information age does spamming raise?
Which of the five moral dimensions of the information age does spamming raise?
a) quality of life
b) system quality
c) accountability and control
d)...
The US CAN-SPAM Act of 2003
The US CAN-SPAM Act of 2003
a) makes spamming illegal
b) requires spammers to identify themselves
c) has dramatically cut down spamming
d) does...
The practice of spamming has been growing because
The practice of spamming has been growing because
a) telephone solicitation is no longer legal
b) it is good advertising practice and brings in many...
The "do anything anywhere" computing environment can
The "do anything anywhere" computing environment can
a) make work environments much more pleasant
b) create economies of efficiency
c) centralize...
Two of the three principal sources of poor system performance are
Two of the three principal sources of poor system performance are
a) software bugs and errors and outdated standards
b) hardware or facility...
Software presents liability problems in terms of legal protections for users because
Software presents liability problems in terms of legal protections for users because
a) of the difficulty in classifying its role as a machine,...
The most common source of business systems failure is
The most common source of business systems failure is
a) software bugs
b) software errors
c) hardware or facilities failures
d) data quality
Answer:...
It is not feasible for companies to produce error-free software because
It is not feasible for companies to produce error-free software because
a) any programming code is susceptible to error
b) it is too expensive to...
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
In general, it is very difficult to hold software producers liable for their software products when those products are considered to be
a) part of...
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
Which of the following adjusts copyright laws to the Internet age by making it illegal to circumvent technology-based protections of copyrighted materials?
a)...
One of the difficulties of patent protection is
One of the difficulties of patent protection is
a) that only the underlying ideas are protected
b) digital media cannot be patented
c) preventing...
The strength of patent protection is that it
The strength of patent protection is that it
a) puts the strength of law behind copyright
b) allows protection from internet theft of ideas put forth...
"Look and feel" copyright infringement lawsuits are concerned with
"Look and feel" copyright infringement lawsuits are concerned with
a) the distinction between tangible and intangible ideas
b) the distinction between...
What legal mechanism protects the owners of intellectual property from having their work copied by others?
What legal mechanism protects the owners of intellectual property from having their work copied by others?
a) patent protection
b) intellectual property...
A limitation of trade secret protection for software is that
A limitation of trade secret protection for software is that
a) it does not protect against copying the underlying ideas behind the software
b) it...
Intellectual property can best be described as
Intellectual property can best be described as
a) intangible property created by individuals or corporations
b) the expression of an intangible...
The P3P standard is concerned with
The P3P standard is concerned with
a) controlling pop-up ads based on user profiles and preventing ads from collecting or sending information
b) allowing...
The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious. Which five moral dimensions does this raise?
The robotics startup you work for has developed an AI-controlled robotic nurse, intended to care for end-of-life patients who are often unconscious....
The Online Privacy Alliance
The Online Privacy Alliance
a) encourages self-regulation to develop a set of privacy guidelines for its members
b) protects user privacy during interactions...
A(n) _______ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be collected.
A(n) _______ model of informed consent permits the collection of personal information until the consumer specifically requests that the data not be...
When a cookie is created during a Web site visit, it is stored
When a cookie is created during a Web site visit, it is stored
a) on the web site computer
b) on the visitor's computer
c) on the ISP's computer
d)...
The US Department of Commerce, developed a _______ framework in order to enable US businesses to legally use personal data from EU countries.
The US Department of Commerce, developed a _______ framework in order to enable US businesses to legally use personal data from EU countries.
a)...
The Internet has made the protection of intellectual property
The Internet has made the protection of intellectual property
a) more difficult, because of the lack of enforceable regulations
b) easier, because...
European privacy protection is _______ than in the United States.
European privacy protection is _______ than in the United States.
a) less far-reaching
b) less liable to laws
c) much less stringent
d) much more...
Which of the following US laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
Which of the following US laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed?
a)...
The Federal Trade Commission FIP principle of Notice/Awareness states that
The Federal Trade Commission FIP principle of Notice/Awareness states that
a) customers must be allowed to choose how their information will...
FIP principles are based on the notion of the
FIP principles are based on the notion of the
a) accountability of the record holder
b) responsibility of the record holder
c) mutuality of...
Which US act restricts the information the federal government can collect and regulates what they can do with the information?
Which US act restricts the information the federal government can collect and regulates what they can do with the information?
a) privacy act of 1974
b)...
According to the _______, you should take the action that produces the least harm.
According to the _______, you should take the action that produces the least harm.
a) categorical imperative
b) risk aversion principle
c) utilitarian...
The ethical "no free lunch" rule states that
The ethical "no free lunch" rule states that
a) if an action cannot be taken repeatedly, then it is not right to be taken at any time
b) one should...
Immanuel Kant's Categorical Imperative states that
Immanuel Kant's Categorical Imperative states that
a) if an action cannot be taken repeatedly, then it is not right to be taken at any time
b) one...
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is
A classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian...
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle?
A colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You...
Which of the following is NOT one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
Which of the following is NOT one of the five steps discussed in the chapter as a process for analyzing an ethical issue?
a) assign responsibility
b)...
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called
The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that...
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called
a) due process
b) accountability
c)...
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems, or organizations is referred to as
The feature of political systems in which a body of laws is in place that permits individuals to recover the damages done to them by other actors, systems,...
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
Accepting the potential costs, duties, and obligations for the decisions you make is referred to as
a) responsibility
b) accountability
c) liability
d)...
NORA is a
NORA is a
a) profiling technology used by the EU
b) federal privacy law protecting networked data
c) new data analysis technology that finds hidden...
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
Which of the five moral dimensions of the information age do the central business activities of ChoicePoint raise?
a) property rights and obligations
b)...
The use of computers to combine data form multiple sources and create electronic dossiers of detailed information on individuals is called
The use of computers to combine data form multiple sources and create electronic dossiers of detailed information on individuals is called
a) profiling
b)...
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18 months, (2) data analysis advances, (3) declining data storage costs, and (4) _______
The four key technical trends responsible for current ethical stresses related to information technology are (1) doubling of computer power every 18...
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within the moral dimension of
In the information age, the obligations that individuals and organizations have regarding the preservation of existing values and institutions fall...
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of
In the information age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension...
The introduction of new information technology has a
The introduction of new information technology has a
a) dampening effect on the new discourse of business ethics
b) ripple effect raising new...
Which of the following best describes how new information systems result in legal gray areas?
Which of the following best describes how new information systems result in legal gray areas?
a) they work with networked, electronic data, which...
The use of Internet technologies allows companies to more easily sustain competitive advantage.
The use of Internet technologies allows companies to more easily sustain competitive advantage.
Answer: False, competitive advantage is not always...
The term business ecosystem describes the interplay between the various organizational forces within a firm.
The term business ecosystem describes the interplay between the various organizational forces within a firm.
Answer: False, another term for loosely...
In a demonstration of network economics, the more people that use Adobe software and related products, the greater the value of the software.
In a demonstration of network economics, the more people that use Adobe software and related products, the greater the value of the software.
Answer:...
All organizations have bedrock, unassailable assumptions that define their goals and products.
All organizations have bedrock, unassailable assumptions that define their goals and products.
Answer: Tr...
The idea driving synergies is that when the output of some units can be used as inputs to other units, the relationship can lower cost and generate profits.
The idea driving synergies is that when the output of some units can be used as inputs to other units, the relationship can lower cost and generate...
The value chain model classifies all company activities as either primary or support.
The value chain model classifies all company activities as either primary or support.
Answer: Tr...
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create value for the customer.
In the value chain model, primary activities are most directly related to the production and distribution of the firm's products and services that create...
In the age of the Internet, Porter's traditional competitive forces model is still at work, but competitive rivalry has become much more intense.
In the age of the Internet, Porter's traditional competitive forces model is still at work, but competitive rivalry has become much more intense.
Answer:...
Strong linkages to customers and suppliers decrease switching costs.
Strong linkages to customers and suppliers decrease switching costs.
Answer: False, strong linkages increase switching cos...
Mass customization is a form of mass production.
Mass customization is a form of mass production.
Answer: Tr...
In the strategy of product differentiation, information systems are used to enable new products and services.
In the strategy of product differentiation, information systems are used to enable new products and services.
Answer: Tr...
In an efficient customer response system, digital answering systems are used to monitor and respond to customer inquiries.
In an efficient customer response system, digital answering systems are used to monitor and respond to customer inquiries.
Answer: False, directly...
The effect of the Internet has been to raise bargaining power over suppliers.
The effect of the Internet has been to raise bargaining power over suppliers.
Answer: Tr...
A transparent marketplace means that there is high product differentiation.
A transparent marketplace means that there is high product differentiation.
Answer: False, there is little product differentiatio...
Customers are one of the competitive forces that affect an organization's ability to compete.
Customers are one of the competitive forces that affect an organization's ability to compete.
Answer: Tr...
Research has shown that only 25% of firms are able to align their information technology with their business goals.
Research has shown that only 25% of firms are able to align their information technology with their business goals.
Answer: Tr...
The competitive forces model was created for today's digital firm.
The competitive forces model was created for today's digital firm.
Answer: False, controls future firms as we...
A firm can be said to have competitive advantage when they have higher stock market valuations than their competitors.
A firm can be said to have competitive advantage when they have higher stock market valuations than their competitors.
Answer: Tr...
From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor.
From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional...
An adhocracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
An adhocracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
Answer: False, Adhocracy...
From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional capital and labor.
From the point of view of economics, information systems technology can be viewed as a factor of production that can be substituted for traditional...
An adhocracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
An adhocracy is a knowledge-based organization where goods and services depend on the expertise and knowledge of professionals.
False, Adhocracy is...
Supply chain management systems are more externally oriented than enterprise systems.
Supply chain management systems are more externally oriented than enterprise systems.
Answer: Tr...
Enterprise systems often include transactions with customers and vendors.
Enterprise systems often include transactions with customers and vendors.
Answer: Tr...
Information supplied by an enterprise system is structured around cross-functional business processes.
Information supplied by an enterprise system is structured around cross-functional business processes.
Answer: Tr...
ESSs are designed primarily to solve specific problems.
ESSs are designed primarily to solve specific problems.
Answer: Fal...
A Skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool.
A Skype conference call using VOIP and webcams is an example of a remote, synchronous collaboration tool.
Answer: Tr...
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
ESSs are designed to incorporate data about external events, but they also draw summarized information from internal MIS and DSS.
Answer: Tr...
ESSs are designed to serve the middle management of the organization.
ESSs are designed to serve the middle management of the organization.
Answer: Fal...
Decision-support systems use internal information as well as information from external sources.
Decision-support systems use internal information as well as information from external sources.
Answer: Tr...
Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
Decision-support systems help managers make decisions that are unique, rapidly changing, and not easily specified in advance.
Answer: Tr...
Most MISs use sophisticated mathematical models or statistical techniques.
Most MISs use sophisticated mathematical models or statistical techniques.
Answer: Fal...
Managers need TPSs to monitor the status of internal operations and the firm's relations with the external environment.
Managers need TPSs to monitor the status of internal operations and the firm's relations with the external environment.
Answer: Tr...
Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional systems.
Functional systems that support business processes within a single functional group, such as human resources, are being phased out in favor of cross-functional...
Enrolling employees in benefits plans is a business process handled by the finance and accounting function.
Enrolling employees in benefits plans is a business process handled by the finance and accounting function.
Answer: Fal...
Management information systems typically support nonroutine decision making.
Management information systems typically support nonroutine decision making.
Answer: Fal...
A hotel reservation system is a typical example of a management information system.
A hotel reservation system is a typical example of a management information system.
Answer: Fal...
A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
A transaction processing system is a computerized system that performs and records the daily routine transactions necessary to conduct business.
Answer:...
Transaction processing systems are most commonly used by the senior management level of an organization.
Transaction processing systems are most commonly used by the senior management level of an organization.
Answer: Fal...
Online collaboration tools eliminate the need for global firms to have synchronous collaboration.
Online collaboration tools eliminate the need for global firms to have synchronous collaboration.
Answer: Tr...
You would use an MIS to help decide whether to introduce a new product line.
You would use an MIS to help decide whether to introduce a new product line.
Answer: Fal...
Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.
Operational management is responsible for directing the day-to-day operations of the business and therefore needs transaction-level information.
Answer:...
The behavioral approach to information systems leaves aside technical solutions to instead analyze the psychological, social, and economic impacts of systems.
The behavioral approach to information systems leaves aside technical solutions to instead analyze the psychological, social, and economic impacts of...
A firm that invests in efficient business processes is making an investment in organizational complementary assets.
A firm that invests in efficient business processes is making an investment in organizational complementary assets.
Answer: Tr...
Government and private sector standards are examples of complementary social assets required to optimize returns from IT investments.
Government and private sector standards are examples of complementary social assets required to optimize returns from IT investments.
Answer: Tr...
Studies have consistently shown that firms who invest greater amounts in information technology receive greater benefits than firms that invest less.
Studies have consistently shown that firms who invest greater amounts in information technology receive greater benefits than firms that invest less.
Answer:...
UPS's use of Web-based tools that allow customers to embed UPS functions such as tracing and cost calculations into their own Web sites was an information systems solution used to achieve customer intimacy.
UPS's use of Web-based tools that allow customers to embed UPS functions such as tracing and cost calculations into their own Web sites was an information...
An IT infrastructure provides the platform on which the firm can build its information systems.
An IT infrastructure provides the platform on which the firm can build its information systems.
Answer: Tr...
Intranets allow firms to work easily with third-party suppliers and vendors.
Intranets allow firms to work easily with third-party suppliers and vendors.
False, intranet is only applied within the busines...
A substantial part of management responsibility is creative work driven by new knowledge and information.
A substantial part of management responsibility is creative work driven by new knowledge and information.
Answer: Tr...
Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.
Business processes are logically related tasks for accomplishing tasks that have been formally encoded by an organization.
Answer: False, they are...
In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company.
In order to understand how a specific business firm uses information systems, you need to know something about the hierarchy and culture of the company.
Answer:...
There are four major business functions: Sales and marketing; manufacturing and production; finance and accounting; and information technology.
There are four major business functions: Sales and marketing; manufacturing and production; finance and accounting; and information technology.
Answer:...
Knowledge workers assist with paperwork at all levels of the firm.
Knowledge workers assist with paperwork at all levels of the firm.
Answer: False, not all levels do paperwor...
The dimensions of information systems are management, organizations, and information technology.
The dimensions of information systems are management, organizations, and information technology.
Answer: Tr...
Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach.
Information systems literacy describes the behavioral approach to information systems, whereas computer literacy describes the technical approach.
Answer:...
Computers are only part of an information system.
Computers are only part of an information system.
Answer: Tr...
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems consist of all the software and business processes needed.
Information technology (IT) consists of all the hardware that a firm needs to use in order to achieve its business objectives, whereas information systems...
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
A business model describes how a company produces, delivers, and sells a product or service to create wealth.
Answer: Tr...
A fully digital firm produces only digital goods or services.
A fully digital firm produces only digital goods or services.
Answer: False, an example is eB...
Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
Developing a new product, fulfilling an order, and hiring a new employee are examples of business processes.
Answer: Tr...
Internet advertising is growing at approximately 10 percent a year.
Internet advertising is growing at approximately 10 percent a year.
Answer: Tr...
Subscribe to:
Posts (Atom)