The Best Essay Writing Service

Get started with the best Essay Writing Service around. Simply send us your essay question, and we’ll locate an expertly qualified writer to create an answer like no other. wycieczka do czarnobyla z kijowa po polsku

Assignment 01 BZ380 Management Information Systems

Assignment 01 BZ380 Management Information Systems Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be a minimum of one (1) single-spaced page to a maximum of two (2) pages in length; refer to the Assignment Format page for specific format requirements. 1. Describe three (3) ways in which information system are transforming business. (33 points) 2. What is information systems literacy? How does it differ from computer literacy? (34 points) 3. List and describe the organizational, management, and technology dimensions of information systems. (33 points) This is the end of Assignment 01. Assignment 05 BZ380 Management Information Systems Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be a minimum of one (1) single-spaced page to a maximum of two (2) pages in length; refer to the Assignment Format page for specific format requirements. What is an enterprise system and how does it work? Discuss at least three (3) ways it can provide value for a company. This is the end of Assignment 05.Part 1 of 1 – 100.0/ 100.0 PointsQuestion 1 of 205.0/ 5.0 PointsIdentifying customers is a responsibility of the __________ function. A. finance and accounting B. human resources C. manufacturing and production D. sales and marketingQuestion 2 of 205.0/ 5.0 PointsProducing bills of materials is a business process within the __________ function. A. finance and accounting B. human resources C. manufacturing and production D. sales and marketingQuestion 3 of 205.0/ 5.0 PointsWhich of the following is an example of a cross-functional business process? A. Identifying customers B. Creating a new product C. Assembling a product D. Paying creditorsQuestion 4 of 205.0/ 5.0 PointsTo monitor the status of internal operations and the firm’s relations with the external environment, managers need __________ systems. A. decision-support B. knowledge C. transaction processing D. management informationQuestion 5 of 205.0/ 5.0 PointsWhich systems are typically a major source of data for other systems? A. Transaction processing systems B. Management information systems C. Executive support systems D. Decision-support systemsQuestion 6 of 205.0/ 5.0 PointsWhich type of system would you use to determine the five suppliers with the worst record in delivering goods on time? A. ESS B. TPS C. MIS D. DSSQuestion 7 of 205.0/ 5.0 PointsA relocation control system that reports summaries on the total moving, house-hunting, and home financing costs for employees in all company divisions would fall into the category of: A. knowledge management systems. B. transaction processing systems. C. executive-support systems. D. management information systems.Question 8 of 205.0/ 5.0 PointsDecisions that are unique, rapidly changing, and not easily specified in advance are best suited to which type of system? A. MIS B. TPS C. ESS D. DSSQuestion 9 of 205.0/ 5.0 PointsWhich systems often deliver information to senior executives through a portal, which uses a Web interface to present integrated personalized business content? A. Transaction processing systems B. Executive support systems C. Management information systems D. Decision-support systemsQuestion 10 of 205.0/ 5.0 PointsA(n) __________ system collects data from various key business processes and stores the data in a single, comprehensive data repository, usable by other parts of the business. A. transaction B. enterprise C. automatic reporting D. management informationQuestion 11 of 205.0/ 5.0 PointsHilton Hotels’ use of customer information software to identify the most profitable customers to direct services to is an example of using information systems to: A. strengthen customer intimacy. B. differentiate their service. C. focus on market niche. D. increase efficiency.Question 12 of 205.0/ 5.0 PointsAn information system can enable a company to focus on a market niche through: A. complex trend forecasting. B. tailoring products to the client. C. intensive product trend analysis. D. intensive customer data analysis.Question 13 of 205.0/ 5.0 PointsWhich industries did the first wave of e-commerce transform? A. Air travel, books, bill payments B. Air travel, books, music C. Real estate, air travel, books D. Real estate, books, bill paymentsQuestion 14 of 205.0/ 5.0 PointsTo what competitive force did the printed encyclopedia industry succumb? A. Positioning and rivalry among competitors B. Low cost of entry C. Substitute products or services D. Customer’s bargaining powerQuestion 15 of 205.0/ 5.0 PointsInternet technology: A. makes it easy for rivals to compete on price alone. B. imposes a significant cost of entry, due to infrastructure requirements. C. increases the difference between competitors because of the wide availability of information. D. makes it easy to sustain operational advantages.Question 16 of 205.0/ 5.0 PointsThe Internet raises the bargaining power of customers by: A. creating new opportunities for building loyal customer bases. B. making more products available. C. making information available to everyone. D. lowering transaction costs.Question 17 of 205.0/ 5.0 PointsThe value chain model: A. categorizes five related advantages for adding value to a firm’s products or services. B. sees the supply chain as the primary activity for adding value. C. categorizes four basic strategies a firm can use to enhance its value chain. D. helps a firm identify points at which information technology can most effectively enhance its competitive position.Question 18 of 205.0/ 5.0 PointsThe primary activities of a firm include: A. inbound logistics, operations, outbound logistics, sales and marketing, and service. B. inbound logistics, operations, outbound logistics, technology, and service. C. procurement, inbound logistics, operations, technology, and outbound logistics. D. procurement, operations, technology, sales and marketing, and services.Question 19 of 205.0/ 5.0 PointsThe most successful solutions or methods for achieving a business objective are called: A. value activities. B. best processes. C. core competencies. D. best practices.Question 20 of 205.0/ 5.0 PointsThe secondary activities of a firm include: A. inbound logistics, technology, outbound logistics, sales and marketing, and service. B. inbound logistics, organization infrastructure, outbound logistics, technology, and procurement. C. organization infrastructure, human resources, sales and marketing, and technology. D. organization infrastructure, human resources, technology, and procurement.32QOnline Exam 3_03Part 1 of 1 -Question 1 of 205.0/ 5.0 PointsThe introduction of new information technology has a: A. dampening effect on the discourse of business ethics. B. ripple effect raising new ethical, social, and political issues. C. beneficial effect for society as a whole, while raising dilemmas for consumers. D. waterfall effect in raising ever more complex ethical issues.Question 2 of 205.0/ 5.0 PointsA colleague of yours frequently takes for his own personal use small amounts of office supplies, noting that the loss to the company is minimal. You counter that if everyone were to take the office supplies, the loss would no longer be minimal. Your rationale expresses which historical ethical principle? A. Kant’s Categorical Imperative B. The Golden Rule C. The Risk Aversion Principle D. The No free lunch ruleQuestion 3 of 205.0/ 5.0 PointsA classic ethical dilemma is the hypothetical case of a man stealing from a grocery store in order to feed his starving family. If you used the Utilitarian Principle to evaluate this situation, you might argue that stealing the food is: A. acceptable, because the grocer suffers the least harm. B. acceptable, because the higher value is the survival of the family. C. wrong, because the man would not want the grocery to steal from him. D. wrong, because if everyone were to do this, the concept of personal property is defeated.Question 4 of 205.0/ 5.0 PointsThe ethical no free lunch rule states that: A. if an action cannot be taken repeatedly, then it is not right to be taken at any time. B. one should take the action that produces the least harm or incurs the least cost. C. one can put values in rank order and understand the consequences of various courses of action. D. everything is owned by someone else, and that the creator wants compensation for this work.Question 5 of 205.0/ 5.0 PointsWhich U.S. act restricts the information the federal government can collect and regulates what they can do with the information? A. Privacy Act of 1974 B. Gramm-Leach-Bliley Act of 1999 C. Freedom of Information Act D. HIPAA of 1996Question 6 of 205.0/ 5.0 PointsFIP principles are based on the notion of the: A. accountability of the record holder. B. responsibility of the record holder. C. mutuality of interest between the record holder and the individual. D. privacy of the individual.Question 7 of 205.0/ 5.0 PointsThe Federal Trade Commission FIP principle of Notice/Awareness states that: A. customers must be allowed to choose how their information will be used for secondary purposes other than the supporting transaction. B. data collectors must take responsible steps to assure that consumer information is accurate and secure from unauthorized use. C. there is a mechanism in place to enforce FIP principles. D. Web sites must disclose their information practices before collecting data.Question 8 of 205.0/ 5.0 PointsWhich of the following U.S. laws gives patients access to personal medical records and the right to authorize how this information can be used or disclosed? A. HIPAA B. Gramm-Leach-Bliley Act C. Privacy Protection Act D. Freedom of Information ActQuestion 9 of 205.0/ 5.0 PointsEuropean privacy protection is __________ than in the United States. A. less far-reaching B. less liable to laws C. much less stringent D. much more stringentQuestion 10 of 205.0/ 5.0 PointsThe do anything anywhere computing environment can: A. make work environments much more pleasant. B. create economies of efficiency. C. centralize power at corporate headquarters. D. blur the traditional boundaries between work and family time.Question 11 of 205.0/ 5.0 PointsToday’s nanotechnology-produced computer transistors are roughly equivalent in size to: A. the width of a fingernail. B. a human hair. C. a virus. D. an atom.Question 12 of 205.0/ 5.0 PointsSpecifications that establish the compatibility of products and the ability to communicate in a network are called: A. network standards. B. telecommunications standards. C. technology standards. D. Internet standards.Question 13 of 200.0/ 5.0 Points__________ unleash powerful economies of scale and result in declines in manufactured computer products. A. Internet and web technologies B. Technology standards C. Linux and open-source software D. Client/server technologiesQuestion 14 of 200.0/ 5.0 PointsSoftware that manages the resources of the computer is called: A. operating system software. B. application software. C. data management software. D. network software.Question 15 of 205.0/ 5.0 PointsA SAN is a __________ network. A. server area B. storage area C. scalable architecture D. service-oriented architectureQuestion 16 of 205.0/ 5.0 PointsAs referred to in the text, legacy systems are: A. traditional mainframe-based business information systems. B. electronic spreadsheets used on a PC. C. any pre-1990 Wintel systems. D. systems found on older ASPs.Question 17 of 205.0/ 5.0 PointsLegacy systems are still used because they: A. can only be run on the older mainframe computers. B. are too expensive to redesign. C. integrate well using new Web services technologies. D. contain valuable data that would be lost during redesign.Question 18 of 205.0/ 5.0 PointsSoftware applications that are based on combining different online software applications are called: A. integrated software. B. Ajax. C. mashups. D. virtual software.Question 19 of 205.0/ 5.0 PointsThe practice of contracting custom software development to an outside firm is commonly referred to as: A. outsourcing. B. scaling. C. service-oriented architecture. D. application integration.Question 20 of 205.0/ 5.0 PointsWhich of the following refers to the ability of a computer, product, or system to expand to serve a larger number of users without breaking down? A. Modality B. Scalability C. Expandability D. DisintermediationOnline Exam 4_04Part 1 of 1 -Question 1 of 205.0/ 5.0 PointsOracle Database Lite is a(n): A. DBMS for small handheld computing devices. B. Internet DBMS. C. mainframe relational DBMS. D. DBMS for midrange computers.Question 2 of 205.0/ 5.0 PointsMicrosoft SQL Server is a(n): A. DBMS for small handheld computing devices. B. Internet DBMS. C. desktop relational DBMS. D. DBMS for midrange computers.Question 3 of 205.0/ 5.0 PointsIn a table for customers, the information about a single customer would reside in a single: A. field. B. row. C. column. D. table.Question 4 of 205.0/ 5.0 PointsA field identified in a table as holding the unique identifier of the table’s records is called the: A. primary key. B. key field. C. primary field. D. unique ID.Question 5 of 205.0/ 5.0 PointsIn a relational database, a record is referred to in technical terms as a(n): A. tuple. B. row. C. entity. D. field.Question 6 of 205.0/ 5.0 PointsThe project operation: A. combines relational tables to provide the user with more information than is otherwise available. B. creates a subset consisting of columns in a table. C. organizes elements into segments. D. identifies the table from which the columns will be selected.Question 7 of 205.0/ 5.0 PointsWhich of the following database types is useful for storing java applets as well as processing large numbers of transactions? A. Relational DBMS B. Hierarchical DBMS C. Object-relational DBMS D. OODBMSQuestion 8 of 205.0/ 5.0 PointsThe type of database management approach that can handle multimedia is the: A. hierarchical DBMS. B. relational DBMS. C. network DBMS. D. object-oriented DBMS.Question 9 of 205.0/ 5.0 PointsThe data dictionary serves as an important data management tool by: A. assigning attributes to the data. B. creating an inventory of data contained in the database. C. presenting data as end users or business specialists would perceive them. D. maintaining data in updated form.Question 10 of 205.0/ 5.0 PointsAn automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security is the: A. data dictionary. B. data definition diagram. C. entity-relationship diagram. D. relationship dictionary.Question 11 of 205.0/ 5.0 PointsThe method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called: A. multiplexing. B. packet switching. C. packet routing. D. ATM.Question 12 of 205.0/ 5.0 PointsIn TCP/IP, IP is responsible for: A. disassembling and reassembling of packets during transmission. B. establishing an Internet connection between two computers. C. moving packets over the network. D. sequencing the transfer of packets.Question 13 of 205.0/ 5.0 PointsWhich signal types are represented by a continuous waveform? A. Digital B. Optical C. Laser D. AnalogQuestion 14 of 205.0/ 5.0 PointsTo use an analog telephone system for sending digital data, you must use: A. twisted wire. B. a router. C. DSL. D. a modem.Question 15 of 205.0/ 5.0 PointsWhich type of network treats all processors equally, and allows peripheral devices to be shared without going to a separate server? A. Peer-to-peer B. Wireless C. LAN D. RingQuestion 16 of 205.0/ 5.0 PointsAll network components connect to a single hub in a __________ network. A. bus B. star C. domain D. peer-to-peerQuestion 17 of 205.0/ 5.0 PointsThe most common Ethernet topology is: A. ring. B. star. C. bus. D. mesh.Question 18 of 205.0/ 5.0 Points__________ work(s) by using radio waves to communicate with radio antennas placed within adjacent geographic areas. A. Cell phones B. Microwaves C. Satellites D. WANsQuestion 19 of 205`.0/ 5.0 PointsDigital subscriber lines: A. have up to twenty-four 64-Kbps channels. B. operate over coaxial lines to deliver Internet access. C. are very-high-speed data lines typically leased from long-distance telephone companies. D. operate over existing telephone lines to carry voice, data, and video.Question 20 of 205.0/ 5.0 PointsWhich protocol is the Internet based on? A. FTP B. TCP/IP C. Packet-switching D. HTTPOnline Exam 6_06Part 1 of 1 – 100.0/ 100.0 PointsQuestion 1 of 205.0/ 5.0 PointsThrough what channel did e-commerce first evolve? A. Online advertising sales B. Internet portals C. Online book sales D. Internet service providersQuestion 2 of 205.0/ 5.0 PointsSince the dot-com bubble burst of 2001, e-commerce revenues: A. have essentially stagnated. B. show signs of stabilizing. C. have returned to solid growth. D. have returned to exponential growth.Question 3 of 205.0/ 5.0 PointsThe quality of ubiquity, as it relates to e-commerce, is illustrated by: A. the same set of standards being used across the globe. B. plentiful, cheap information. C. the enabling of commerce worldwide. D. the availability of Internet technology everywhere and anytime.Question 4 of 205.0/ 5.0 PointsBased on your reading of the chapter, e-commerce is: A. still in a revolutionary phase. B. widely accepted by consumers, although technology is still quickly changing. C. not yet fully accepted by consumers, although much of its driving technology is firmly in place. D. well entrenched as a form of modern commerce.Question 5 of 205.0/ 5.0 PointsThe integration of video, audio, and text marketing messages into a single marketing message and consumer experience describes which dimension of e-commerce technology? A. Ubiquity B. Personalization/customization C. Richness D. InteractivityQuestion 6 of 205.0/ 5.0 PointsSelling the same goods to different targeted groups at different prices is called price: A. customization. B. opacity. C. gouging. D. discrimination.Question 7 of 205.0/ 5.0 PointsThe act of engaging consumers in a dialog that dynamically adjusts the experience to the individual describes which dimension of e-commerce technology? A. Ubiquity B. Personalization/customization C. Richness D. InteractivityQuestion 8 of 205.0/ 5.0 PointsInformation __________ exists when one party in a transaction has more information that is important for the transaction than the other party. A. transparency B. asymmetry C. complexity D. imbalanceQuestion 9 of 205.0/ 5.0 PointsThe cost to a merchant of changing the price of a product is called a __________ cost. A. pricing B. dynamic pricing C. menu D. switchingQuestion 10 of 205.0/ 5.0 PointsChanging organizational behavior by sensing and responding to new experience and knowledge is called: A. change management. B. knowledge networking. C. the knowledge value chain. D. organizational learning.Question 11 of 205.0/ 5.0 PointsWhich of the following statements is NOT an accurate description of the importance of knowledge to a firm? A. Knowledge-based core competencies are key organizational assets. B. Knowledge should be seen as similar to any other key asset, such as a financial asset or a production facility. C. Knowledge enables firms to become more efficient in their use of scarce resources. D. Knowledge is not subject to the law of diminishing returns as are physical assets.Question 12 of 205.0/ 5.0 PointsThe set of business processes, culture, and behavior required to obtain value from investments in information systems is one type of: A. knowledge culture. B. knowledge discovery. C. organizational and management capital. D. organizational routine.Question 13 of 205.0/ 5.0 PointsWhich of the following systems digitizes, indexes, and tags documents according to a coherent framework? A. Wikis B. CAD C. Document management D. LMSQuestion 14 of 205.0/ 5.0 PointsFuzzy logic is a type of: A. data mining. B. neural network. C. intelligent technique. D. business intelligence.Question 15 of 205.0/ 5.0 PointsWhich of the following is NOT a typical component or capability of an enterprise-wide knowledge management system? A. Collaboration tools B. KWS C. Document management D. LMSQuestion 16 of 205.0/ 5.0 PointsWhich of the following would NOT considered semistructured knowledge? A. Request for proposals B. Voice-mail C. Videos D. E-mailQuestion 17 of 205.0/ 5.0 PointsYou are advising a multimedia company on the best type of knowledge management system to help them archive digital video and sound clips. Which of the following will suit their needs? A. Enterprise content management system B. Digital asset management system C. Knowledge network system D. VRML systemQuestion 18 of 205.0/ 5.0 PointsTools for the management, delivery, tracking, and assessment of various types of employee learning best describes a(n): A. investment workstation. B. organizational learning system. C. employee enrichment system. D. learning management system.Question 19 of 205.0/ 5.0 PointsMost knowledge workers require specialized knowledge work systems, but they also rely on: A. office systems. B. schools and universities. C. imaging systems. D. data transferring systems.Question 20 of 205.0/ 5.0 PointsA __________ is very important to a knowledge worker’s system. A. careful filing system B. financial analysis system C. CAD capability D. user-friendly interfaceOnline Exam 7_07Part 1 of 1 – 95.0/ 100.0 PointsQuestion 1 of 205.0/ 5.0 PointsWhen there is no well-understood or agreed-on procedure for making a decision, it is said to be: A. undocumented. B. unstructured. C. documented. D. semistructured.Question 2 of 205.0/ 5.0 PointsThe type of decision that can made by following a definite procedure is called a(n) __________ decision. A. structured B. unstructured C. semistructured D. proceduralQuestion 3 of 205.0/ 5.0 PointsThe decisions involved in creating and producing a corporate intranet can be classified as __________ decisions. A. Procedural B. Unstructured C. Structured D. SemistructuredQuestion 4 of 205.0/ 5.0 PointsThe decision to approve a capital budget is an example of a(n) __________ decision. A. semistructured B. unstructured C. structured D. undocumentedQuestion 5 of 205.0/ 5.0 PointsThe five classical functions of managers are planning, organizing, deciding, controlling, and: A. coordinating. B. leading. C. managing. D. negotiating.Question 6 of 205.0/ 5.0 PointsIn contrast to the classical model of management, behavioral models see the actual behavior of managers as being more: A. systematic. B. informal. C. reflective. D. well organized.Question 7 of 205.0/ 5.0 PointsBehavioral models of managers find that, from observation, managers: A. perform often fewer than 100 activities a day. B. operate best with standardized, predictable, printed information. C. create a formalized, hierarchic structure of contacts to provide filtered information. D. typically work in a fragmented manner, with only 10% of activities exceeding an hour in duration.Question 8 of 205.0/ 5.0 PointsThe concern that the structure of data is consistent within an information source reflects which quality dimension of information? A. Accuracy B. Integrity C. Validity D. ConsistencyQuestion 9 of 205.0/ 5.0 PointsMIS typically produce: A. new ways of looking at data that emphasize change, flexibility, and rapid response. B. fixed, regularly scheduled reports based on data extracted from the organization’s TPS. C. solutions to semistructured problems appropriate for middle management decision making. D. assumptions, responses to ad hoc queries, and graphic representations of existing data.Question 10 of 205.0/ 5.0 PointsThe components of a DSS are the: A. internal corporate database, external data sources, and analysis tools. B. data visualization tools, software, and graphics capabilities. C. database, graphics capabilities, and analysis tools. D. database, software system, and user interface.Question 11 of 205.0/ 5.0 PointsThe four kinds of structural organizational change enabled by IT, in order from least to most risky, are: A. rationalization, automation, reengineering, and redesigning. B. rationalization, automation, reengineering, and paradigm shift. C. automation, rationalization, reengineering, and paradigm shift. D. automation, redesigning, restructuring, and paradigm shift.Question 12 of 205.0/ 5.0 PointsIn automation: A. business processes are simplified. B. business processes are reorganized to cut waste and eliminate repetitive, paper-intensive tasks. C. standard operating procedures are streamlined to remove bottlenecks. D. employees are enabled to perform their tasks more efficiently.Question 13 of 205.0/ 5.0 PointsBusiness processes are analyzed, simplified, and redesigned in: A. BPR. B. rationalization of procedures. C. automation. D. a paradigm shift.Question 14 of 205.0/ 5.0 PointsThe process of streamlining business procedures so that documents can be moved easily and efficiently is called: A. business process reengineering. B. automation. C. work flow management. D. rationalization.Question 15 of 205.0/ 5.0 PointsBased on your reading of the chapter, the redesign of mortgage application process by major mortgage banks was an example of which type of organizational change? A. Automation B. Paradigm shift C. Business process reengineering D. RestructuringQuestion 16 of 205.0/ 5.0 PointsWhich process develops a detailed description of the functions that a new information system must perform? A. Feasibility study B. Requirements analysis C. Systems design D. Test plan developmentQuestion 17 of 200.0/ 5.0 PointsThe entire system-building effort is driven by: A. organizational change. B. feasibility studies. C. the information value chain. D. user information requirements.Question 18 of 205.0/ 5.0 PointsSystems design: A. describes what a system should do to meet information requirements. B. shows how the new system will fulfill the information requirements. C. identifies which users need what information, where, when and how. D. is concerned with the logical view of the system solution.Question 19 of 205.0/ 5.0 PointsIn a parallel conversion strategy, the new system: A. is tested by an outsourced company. B. replaces the old one at an appointed time. C. and the old are run together. D. is introduced in stages.Question 20 of 205.0/ 5.0 PointsChanges in hardware, software, documentation, or production to a production system to correct errors, meet new requirements, or improve processing efficiencies are termed: A. compliance. B. production. C. maintenance. D. acceptance.Online Exam 8_08Part 1 of 1 – 100.0/ 100.0 PointsQuestion 1 of 205.0/ 5.0 PointsWhich method is used to assign weights to various features of a system? A. Information systems plan B. Scoring model C. Portfolio analysis D. CSFQuestion 2 of 205.0/ 5.0 Points__________ are all tangible benefits of information systems. A. Improved asset utilization, increased organizational learning, and improved operations B. Reduced workforce, lower outside vendor costs, and increased productivity C. Increased productivity, reduced workforce, and increased job satisfaction D. Lower operational costs, improved resource control, and more informationQuestion 3 of 205.0/ 5.0 PointsThe principal capital budgeting models for evaluating information technology projects are the payback method, the accounting rate of return on investment (ROI), the net present value, and the: A. future present value. B. internal rate of return. C. external rate of return. D. ROPM.Question 4 of 205.0/ 5.0 PointsTo best evaluate, from a financial standpoint, an IT investment whose benefits cannot be firmly established in advance, you would use: A. capital budgeting. B. the real option pricing model. C. a scoring model. D. the net present value.Question 5 of 205.0/ 5.0 PointsThe organizational activities working toward the adoption, management, and routinization of a new information system are called: A. production. B. maintenance. C. implementation. D. acceptance.Question 6 of 205.0/ 5.0 PointsOne example of an implementation problem is: A. poor user interface. B. inadequate user training. C. project running over budget. D. changes in job activities and responsibilities.Question 7 of 205.0/ 5.0 PointsInternal integration tools: A. enable a project to have sufficient technical support for project management and development. B. enable a project manager to properly document and monitor project plans. C. portray a project as a network diagram with numbered nodes representing project tasks. D. consist of ways to link the work of the implementation team with users at all organization levels.Question 8 of 205.0/ 5.0 PointsAn example of using an internal integration tool would be to: A. define task dependencies. B. include user representatives as active members of the project team. C. create a PERT chart. D. hold frequent project team meetings.Question 9 of 205.0/ 5.0 PointsAn example of using an external integration tool would be to: A. define task dependencies. B. include user representatives as active members of the project team. C. create a PERT chart. D. hold frequent project team meetings.Question 10 of 205.0/ 5.0 PointsWhich of the following is NOT an organizational factor in systems planning and implementation? A. Standards and performance monitoring B. Government regulatory compliance C. Health and safety D. User interfaceQuestion 11 of 205.0/ 5.0 PointsA force in the environment to which businesses must respond and that influences the direction of the business is called a business: A. driver. B. threat. C. process. D. matrix.Question 12 of 205.0/ 5.0 PointsGlobal coordination of all of the major business functions permits the location of business activity according to: A. social norms and values. B. comparative advantage. C. competitive threat. D. knowledge base.Question 13 of 205.0/ 5.0 PointsMaking judgments and taking action on the basis of narrow or personal characteristics is referred to as: A. localization. B. cooptation. C. particularism. D. prejudicial.Question 14 of 205.0/ 5.0 PointsTo avoid the cost and uncertainty of moving information across national boundaries, most multinational firms: A. maintain a master database at their head offices. B. develop a master system that meets the standards of all the countries concerned. C. use microwave satellite transmission to move data. D. develop separate systems within each country.Question 15 of 205.0/ 5.0 PointsA company that controls finances in the home country and decentralizes production, sales, and marketing operations to other countries is using a __________ strategy. A. domestic exporter B. franchising C. transnational D. multinationalQuestion 16 of 205.0/ 5.0 PointsIn centralized systems: A. development occurs at the home base and operations are handed over to autonomous units in foreign locations. B. each foreign unit designs its own unique solutions and systems. C. systems development and operations occur in an integrated and coordinated fashion across all units. D. systems development and operations occur totally at the domestic home base.Question 17 of 205.0/ 5.0 PointsFranchise companies have typically had __________ systems. A. duplicated B. centralized C. networked D. decentralizedQuestion 18 of 205.0/ 5.0 PointsWhich of the following is NOT one of the principle management challenges in developing global systems? A. Encouraging local users to support global systems B. Coordinating applications development C. Defining an acceptable test plan D. Agreeing on common user requirementsQuestion 19 of 205.0/ 5.0 PointsAs a firm moves from local option systems to regional and global systems: A. agency costs increase. B. coordination costs decrease. C. transaction costs increase. D. both transaction and agency costs increase.Question 20 of 205.0/ 5.0 PointsWhen developing a global system, bringing the opposition of local groups into the process of designing and implementing the solution without giving up control over the direction and nature of the change is called: A. cooptation. B. change management. C. implementation. D. advocacy.

Leave a Reply

Your email address will not be published. Required fields are marked (required)