Documente Academic
Documente Profesional
Documente Cultură
1.
IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise. Answer: Difficulty: Easy Reference: pp. 171172 Client/server computing is a widely used form of centralized processing. Answer: Difficulty: Medium Reference: pp. 175, 178 In two-tiered client/server architecture, the processing is split between two types of servers. Answer: Difficulty: Hard Reference: p. 175 Application server software is responsible for locating and managing stored Web pages. Answer: Difficulty: Medium Reference: p. 176 An application server may reside on the same computer as a Web server or on its own dedicated computer. Answer: Difficulty: Medium Reference: p. 176 Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business. Answer: : Difficulty: Medium Reference: p. 177 The mainframe market has grown steadily over the past decade. Answer: Difficulty: Medium Reference: p. 186 The operating system is used to manage the computers activities. Answer: Difficulty: Easy Reference: p. 186 SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers. Answer: Difficulty: Medium Reference: p. 187
2.
3.
4.
5.
6.
7.
8.
9.
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 2 . . Like an ASP, a Web hosting service provides shared applications to subscribed users, but 10. . does this through a Web portal. . Answer: Difficulty: Medium Reference: p. 188
11. Autonomic computing is implemented primarily with enterprise or ISP servers. Answer: Difficulty: Medium Reference: p. 192 N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user. Answer: Difficulty: Hard Reference: pp. 175176 Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses. Answer: Difficulty: Easy Reference: p. 198 Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. Answer: Difficulty: Medium Reference: p. 200 XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data. Answer: Difficulty: Easy Reference: p. 200 Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document. Answer: Difficulty: Easy Reference: p. 200 The collection of Web services that are used to build a firms software systems constitutes what is known as a service-oriented architecture. Answer: Difficulty: Medium Reference: p. 201 Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software. Answer: Difficulty: Medium Reference: p. 204 Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. Answer: Difficulty: Easy Reference: p. 209 TCO refers to the original cost of purchased technology: both hardware and software. Answer: Difficulty: Easy Reference: p. 211
12.
13.
14.
15.
16.
17.
18.
19.
20.
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 3 . . 22. Each characteristic or quality describing a particular entity is called an attribute. . Answer: Difficulty: Easy Reference: pp. 226227 .
23. A DBMS separates the logical and physical views of the data. Answer: Difficulty: Medium Reference: p. 229 Every record in a file should contain at least one key field. Answer: Difficulty: Easy 24.
Reference: p. 230
25.
Many applications today require databases that can store and retrieve multimedia. Answer: Difficulty: Easy Reference: p. 233 One of the drawbacks to OODBMS are that they cannot work with applets. Answer: Difficulty: Medium Reference: p. 233 OODBMS are slower than relational DBMS. Answer: Difficulty: Medium
26.
27.
Reference: p.233
28.
A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database. Answer: Difficulty: Easy Reference: pp. 233234 In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships. Answer: Difficulty: Easy Reference: p. 236 A data warehouse may be updated by a legacy system. Answer: Difficulty: Easy
29.
30.
Reference: p. 239
31.
A data warehouse is typically comprised of several smaller data marts. Answer: Difficulty: Medium Reference: p. 239 OLAP is a key tool of BI. Answer:
32.
Difficulty: Easy
Reference: p. 240
33.
OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases. Answer: Difficulty: Medium Reference: p. 241 Data mining can be a challenge to individual privacy. Answer: Difficulty: Easy Predictive analysis is synonymous with data mining. Answer: Difficulty: Hard
34.
Reference: p. 243
35.
Reference: p. 243
36.
In a Web-based database, middleware is used to transfer information from the organizations internal database back to the Web server for delivery in the form of a Web page to the user. Answer: Difficulty: Medium Reference: p. 245
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 4 . . 37. A Web interface requires changes to the internal database. . . Answer: Difficulty: Easy Reference: p. 246
38. Common Gateway Interface is a specification for processing data on a Web server. Answer: 39. Difficulty: Medium Reference: p. 245
Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource. Answer: Difficulty: Medium Reference: p. 247
40.
Data cleansing is the same process as data scrubbing. Answer: Difficulty: Easy Reference: p. 248
A NOS must reside on a dedicated server computer. FALSE Difficulty: Easy Reference: p. 265
In a client/server network, a network server sets the rule of communication for a network and provides every connected client with an address so it can be found by others on the network. Answer: TRUE Difficulty: Easy Reference: p. 267
44.
Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching Answer: FALSE Difficulty: Easy Reference: p. 267
45.
Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. Answer: TRUE Difficulty: Easy Reference: p. 269
46.
In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment. Answer: FALSE Difficulty: Medium Reference: p. 271
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 5 . . 47. Twisted wire can be used to connect to the Internet at speeds up to 1 Mbps . . Answer: FALSE Difficulty: Easy Reference: p. 272
48. Fiber-optic cable is more difficult to work with and harder to install than wire media. Answer: 49. TRUE Difficulty: Easy Reference: p. 272
The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. Answer: FALSE Difficulty: Hard Reference: p. 274
Frame relay is less expensive than packet switching. FALSE Difficulty: Medium Reference: p. 274
Every computer on the Internet is assigned a unique Internet Protocol (IP) address. Answer: TRUE Difficulty: Medium Reference: p. 277
52.
The success of the Internet is, in part, due to its design as an infinitely scalable network capable of handling millions of users. Answer: FALSE Difficulty: Medium Reference: p. 280
53.
A new version of the IP addressing schema being developed is called Internet Protocol version 6 (IPv6) and contains 128-bit addresses. Answer: TRUE Difficulty: Medium Reference: p. 280
54.
Internet2 is a research network with new protocols and transmission speeds that provides an infrastructure for supporting high-bandwidth Internet applications. Answer: TRUE Difficulty: Medium Reference: p. 280
55.
VoIP technology uses the Internet Protocol to deliver voice information in digital form using packet switching. Answer: TRUE Difficulty: Medium Reference: p. 289
56.
Digital cellular service uses several different competing standards that do not interoperate. Answer: Difficulty: Medium Reference: p. 292
57.
Most Wi-Fi communication uses infrastructure mode. Answer: Difficulty: Medium Reference: p. 295
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 6 . . 58. The 802.11 standard can be used to provide wireless access to the Internet using a broadband . connection. .
Answer: 59. Difficulty: Medium Reference: p. 295 RFID has been exceptionally popular because of its low implementation costs Answer: 60. Answer: Difficulty: Easy Reference: p. 299
Sensor networks typically have a tiered architecture Difficulty: Medium Reference: p. 299
Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines. Answer: Difficulty: Easy Reference: p. 317
63.
The WEP specification calls for users to create unique 40-bit encrypted passwords. Answer: Difficulty: Hard Reference: p. 319
64.
Viruses cannot be spread through e-mail. Answer: Difficulty: Easy Reference: p. 319
65.
A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic. Answer: Difficulty: Easy Reference: p. 319
66.
Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer. Answer: Difficulty: Medium Reference: p. 320
67.
One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: Difficulty: Medium Reference: p. 321
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 7 . . 68. Sniffers enable hackers to steal proprietary information from anywhere on a network, . including e-mail messages, company files, and confidential reports. .
Answer: 69. Difficulty: Medium Reference: p. 321 In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points. Answer: 70. Analysis Bot attacks can be prevented by using antivirus and antispyware software. Answer: Analysis in terms of examine 71. The most economically damaging kinds of computer crime are e-mail viruses. Answer: 72. Difficulty: Hard Reference: p. 325 Difficulty: Medium Reference: p. 323 Difficulty: Medium Reference: p. 322
Computer forensics experts try to recover ambient data, which are not visible to the average computer user. Answer: Difficulty: Medium Reference: pp. 329330
73.
An acceptable use policy defines the acceptable level of access to information assets for different users. Answer: Difficulty: Medium Reference: p. 331
74.
Fault-tolerant computers contain redundant hardware, software, and power supply components. Answer: Difficulty: Easy Reference: p. 333
75.
A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Answer: Difficulty: Easy Reference: p. 333
76.
Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Answer: Difficulty: Easy Reference: p. 336
77.
NAT conceals the IP addresses of the organizations internal host computers to deter sniffer programs. Answer: Difficulty: Medium Reference: p. 338
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 8 . . 78. Antivirus software can detect and eliminate viruses that are trying to enter your system. . . Answer: Difficulty: Easy Reference: p. 338
79. SSL is a protocol used to secure information transfer over the Internet. Answer: 80. Difficulty: Easy Reference: p. 339
Public key encryption uses mathematically related keys. Answer: Difficulty: Medium Reference: p. 341
Chapter 9
Achieving Operational Excellence and Customer Intimacy: Enterprise Applications
81. Manufacturing companies typically think about their supply chains as a process ultimately focused on serving the customer. Answer: 82. Difficulty: Medium Reference: p. 355
Enterprise software allows data to be used by multiple functions and business processes for precise organizational coordination and control. Answer: Difficulty: Easy Reference: p. 359
83.
Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. Answer: Difficulty: Hard Reference: p. 359
84.
The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers. Answer: Difficulty: Medium Reference: p. 361
85.
Supply chain inefficiencies can waste as much as 25 percent of a companys operating costs. Answer: Difficulty: Medium Reference: p. 361
86.
Low inventory acts a buffer for the lack of flexibility in the supply chain. Answer: Difficulty: Medium Reference: p. 362
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 9 . . 87. The bullwhip effect is the distortion of information about the demand for a product as it . passes from one entity to the next across the supply chain. .
Answer: 88. Difficulty: Medium Reference: p. 362 Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product. Answer: 89. Difficulty: Hard Reference: p. 364
In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes. Answer: Difficulty: Easy Reference: p. 365
90.
Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. Answer: Difficulty: Easy Reference: p. 365
Retail consumer e-commerce is currently growing at single-digit rates. Difficulty: Easy Reference: p. 392
The Internet shrinks information asymmetry. Answer: Difficulty: Medium Reference: p. 396
94.
Information asymmetry exists when one party in a transaction has more information for the transaction than the other party. Answer: Difficulty: Medium Reference: p. 396
95.
Disintermediation provides major benefits to the distributor. Answer: Difficulty: Medium Reference: p. 397
96.
A banner ad opens automatically and does not disappear until the user clicks on it. Answer: Difficulty: Medium Reference: p. 400
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 10 . . 97. An online syndicator aggregates content or applications from multiple sources, packaging . them for distribution, and reselling them to third-party Web sites. .
Answer: 98. Difficulty: Medium Reference: p. 403 Mobile commerce is the use of wireless devices to conduct e-commerce transactions from any location. Answer: 99. Difficulty: Easy Reference: p. 404
Web sites can gather bountiful detailed information about customer behavior and demographics. Answer: Difficulty: Easy Reference: p. 405
100.
Blogs have had a significant impact on political affairs. Answer: Difficulty: Easy Reference: p. 407
Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents. Answer: Difficulty: Easy Reference: p. 432
103.
Knowledge is universally applicable and easily moved. Answer: Difficulty: Easy Reference: p. 433
104.
The CIO is a senior executive who is responsible for the firms knowledge management program. Answer: Difficulty: Easy Reference: p. 436
105.
COPs are formal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests. Answer: Difficulty: Medium Reference: p. 436
106.
Structured knowledge is explicit knowledge that exists in informal documents. Answer: Difficulty: Easy Reference: p. 437438
1 0
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 11 . . 107. Semistructured information is all the knowledge in a firm that resides in the heads of . experienced employees. .
Answer: 108. Difficulty: Medium Reference: p. 438 Knowledge workers are primarily clerical and data workers who usually do not possess high levels of education. Answer: Difficulty: Easy Reference: p. 448 VRML is platform dependent, operates over a minicomputer, and requires large amounts of bandwidth. Answer: Difficulty: Medium Reference: p. 450 Expert systems are the primary tools used for knowledge discovery. Answer: Difficulty: Easy Reference: p. 451
109.
110.
112.
113.
Middle management tends to face more structured decision scenarios, and rarely include unstructured components. Answer: Difficulty: Easy Reference: p. 475
115.
Rank-and-file employees tend to make more structured decisions. Answer: Difficulty: Easy Reference: p. 475
116.
The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization. Answer: Difficulty: Easy Reference: p. 476
117.
The implementation phase of Simons decision making model includes choosing among solution alternatives. Answer: Difficulty: Medium Reference: p. 476
1 1
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 12 . . 118. The first stage in Simon's decision-making process model is the design stage. . . Answer: Difficulty: Easy Reference: p. 476
119. The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others. Answer: 120. Difficulty: Medium Reference: p. 477
MIS typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems. Answer: Difficulty: Easy Reference: p. 480
Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system. Answer: Difficulty: Medium Reference: p. 515
123.
Rationalization of procedures describes a radical rethinking of the business models. Answer: Difficulty: Medium Reference: p. 515
124.
All business processes are composed of a flow of goods and services. Answer: Difficulty: Medium Reference: p. 520
125.
TQM describes the measurement of quality as 3.4 defects per million. Answer: Difficulty: Medium Reference: p. 523
126.
Thorough testing is not required if, during the programming stage, the design documents are sufficiently detailed. Answer: Difficulty: Medium Reference: p. 527
127.
The system is not in production until conversion is complete. Answer: Difficulty: Easy Reference: p. 528
128.
Documentation reveals how well the system has met its original objectives. Answer: Difficulty: Hard Reference: p. 528
1 2
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 13 . . 129. The oldest method for building information systems is prototyping. . . Answer: Difficulty: Medium Reference: p. 534
130. Prototyping is more iterative than the conventional lifecycle. Answer: Difficulty: Medium Reference: p. 535
The information systems steering committee is composed of information systems managers and end-user managers responsible for overseeing several specific information systems projects. Answer: Difficulty: Hard Reference: p. 558
133.
An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals. Answer: Difficulty: Medium Reference: p. 559
134.
If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision. Answer: Difficulty: Medium Reference: p. 559
135.
Scoring models are used most commonly to support decisions rather than as the final arbiters of system selection. Answer: Difficulty: Medium Reference: p. 565
136.
Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information systems Answer: Difficulty: Hard Reference: p. 565
137.
A benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and soft factors such as benefits and complexity costs. Answer: Difficulty: Medium Reference: p. 565
1 3
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 14 . . 138. Intangible benefits cannot be immediately quantified but may lead to . quantifiable gains in the long run. .
Answer: 139. Difficulty: Easy Reference: p. 565 More timely information is a tangible benefit of information systems. Answer: 140. Difficulty: Medium Reference: p. 566
The IRR calculates the rate of return from an investment by adjusting the cash inflows produced by the investment for depreciation. Answer: Difficulty: Easy Reference: p. 570
142.
143.
144.
145.
146.
147.
148.
149.
1 4
. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 15 . . 150. Globalization means that companies can be less concerned with the laws governing the . movement of information. . Answer: Difficulty: Easy Reference: p. 600
151. European countries have very strict laws concerning transborder data flows and privacy. Answer: Difficulty: Easy Reference: p. 600 The European Union Data Protection Directive restricts the flow of any information to countries that do not meet strict European laws on personal information. Answer: Difficulty: Medium Reference: p. 600 To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms have developed information systems within each European country. Answer: Difficulty: Medium Reference: p. 600 With the growth of the Internet and reliable phone networks, skilled consultants are readily available to companies operating in global markets. Answer: Difficulty: Easy Reference: p. 600 The accounting practices of a country are tightly intertwined with that countrys legal system. Answer: Difficulty: Easy Reference: p. 600 In international companies, English has become a kind of standard business language. Answer: Difficulty: Easy Reference: p. 601 In a multinational strategy, products and services on sale in different countries are adapted to serve local market conditions. Answer: Difficulty: Medium Reference: p. 602 Global systems allow fixed costs to be amortized over a much smaller customer base. Answer: Difficulty: Medium Reference: p. 610 The major telecommunications challenge in an international setting is making data flow seamlessly across networks shaped by disparate national standards. Answer: Difficulty: Easy Reference: p. 612 Private networks may not provide the same level of quick and predictable response as VPNs. Answer: Difficulty: Hard Reference: p. 613
152.
153.
154.
155.
156.
157.
158.
159.
160.
1 5