Sunteți pe pagina 1din 15

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes .

. Pgina: 1 . . . Nombre del estudiante: _________________________________________ Carn: _______________ .


Las preguntas que son de True / False (verdadero) (falso) segn sea el caso. (falso / verdadero) solo se debe poner Las que dicen Multiple-Choice Questions es el estilo tradicional de escogencia nica (solo se escoge una de las opciones planteadas y se anota la letra correspondiente. En cada pregunta se incluye el nivel estimado de dificultad junto con una aproximacin de la pgina del libro donde se encuentra la clave de la respuesta. Las preguntas son en ingls cortesa de Pearson Educacin y estn agrupadas por captulo del libro. En este caso incluyen captulos del 1 al 4. . Chapter 5: IT Infrastructure and Emerging Technologies
Questions

1.

IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise. Answer: Difficulty: Easy Reference: pp. 171172 Client/server computing is a widely used form of centralized processing. Answer: Difficulty: Medium Reference: pp. 175, 178 In two-tiered client/server architecture, the processing is split between two types of servers. Answer: Difficulty: Hard Reference: p. 175 Application server software is responsible for locating and managing stored Web pages. Answer: Difficulty: Medium Reference: p. 176 An application server may reside on the same computer as a Web server or on its own dedicated computer. Answer: Difficulty: Medium Reference: p. 176 Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business. Answer: : Difficulty: Medium Reference: p. 177 The mainframe market has grown steadily over the past decade. Answer: Difficulty: Medium Reference: p. 186 The operating system is used to manage the computers activities. Answer: Difficulty: Easy Reference: p. 186 SANs create large central pools of storage that can be rapidly accessed and shared by multiple servers. Answer: Difficulty: Medium Reference: p. 187

2.

3.

4.

5.

6.

7.

8.

9.

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 2 . . Like an ASP, a Web hosting service provides shared applications to subscribed users, but 10. . does this through a Web portal. . Answer: Difficulty: Medium Reference: p. 188
11. Autonomic computing is implemented primarily with enterprise or ISP servers. Answer: Difficulty: Medium Reference: p. 192 N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less expensive servers located nearby the user. Answer: Difficulty: Hard Reference: pp. 175176 Java software is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses. Answer: Difficulty: Easy Reference: p. 198 Web services can exchange information between two different systems regardless of the operating system or programming languages on which the systems are based. Answer: Difficulty: Medium Reference: p. 200 XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data. Answer: Difficulty: Easy Reference: p. 200 Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document. Answer: Difficulty: Easy Reference: p. 200 The collection of Web services that are used to build a firms software systems constitutes what is known as a service-oriented architecture. Answer: Difficulty: Medium Reference: p. 201 Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software. Answer: Difficulty: Medium Reference: p. 204 Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down. Answer: Difficulty: Easy Reference: p. 209 TCO refers to the original cost of purchased technology: both hardware and software. Answer: Difficulty: Easy Reference: p. 211

12.

13.

14.

15.

16.

17.

18.

19.

20.

Chapter 6: Foundations of Business Intelligence: DatabasesandInformation Management


21. A grouping of characters into a word, a group of words, or a complete number is called a record. Answer: Difficulty: Easy Reference: p. 226

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 3 . . 22. Each characteristic or quality describing a particular entity is called an attribute. . Answer: Difficulty: Easy Reference: pp. 226227 .
23. A DBMS separates the logical and physical views of the data. Answer: Difficulty: Medium Reference: p. 229 Every record in a file should contain at least one key field. Answer: Difficulty: Easy 24.

Reference: p. 230

25.

Many applications today require databases that can store and retrieve multimedia. Answer: Difficulty: Easy Reference: p. 233 One of the drawbacks to OODBMS are that they cannot work with applets. Answer: Difficulty: Medium Reference: p. 233 OODBMS are slower than relational DBMS. Answer: Difficulty: Medium

26.

27.

Reference: p.233

28.

A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database. Answer: Difficulty: Easy Reference: pp. 233234 In a relational database, complex groupings of data must be streamlined to eliminate awkward many-to-many relationships. Answer: Difficulty: Easy Reference: p. 236 A data warehouse may be updated by a legacy system. Answer: Difficulty: Easy

29.

30.

Reference: p. 239

31.

A data warehouse is typically comprised of several smaller data marts. Answer: Difficulty: Medium Reference: p. 239 OLAP is a key tool of BI. Answer:

32.

Difficulty: Easy

Reference: p. 240

33.

OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases. Answer: Difficulty: Medium Reference: p. 241 Data mining can be a challenge to individual privacy. Answer: Difficulty: Easy Predictive analysis is synonymous with data mining. Answer: Difficulty: Hard

34.

Reference: p. 243

35.

Reference: p. 243

36.

In a Web-based database, middleware is used to transfer information from the organizations internal database back to the Web server for delivery in the form of a Web page to the user. Answer: Difficulty: Medium Reference: p. 245

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 4 . . 37. A Web interface requires changes to the internal database. . . Answer: Difficulty: Easy Reference: p. 246
38. Common Gateway Interface is a specification for processing data on a Web server. Answer: 39. Difficulty: Medium Reference: p. 245

Data administration is a special organizational function that manages the policies and procedures through which data can be managed as an organizational resource. Answer: Difficulty: Medium Reference: p. 247

40.

Data cleansing is the same process as data scrubbing. Answer: Difficulty: Easy Reference: p. 248

Chapter 7:T elecommunications, the Internet,andWirelessT echnology


41. Telephone networks are fundamentally different from computer networks. Answer: 42. Answer: 43. TRUE Difficulty: Medium Reference: p. 263

A NOS must reside on a dedicated server computer. FALSE Difficulty: Easy Reference: p. 265

In a client/server network, a network server sets the rule of communication for a network and provides every connected client with an address so it can be found by others on the network. Answer: TRUE Difficulty: Easy Reference: p. 267

44.

Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching Answer: FALSE Difficulty: Easy Reference: p. 267

45.

Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms. Answer: TRUE Difficulty: Easy Reference: p. 269

46.

In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment. Answer: FALSE Difficulty: Medium Reference: p. 271

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 5 . . 47. Twisted wire can be used to connect to the Internet at speeds up to 1 Mbps . . Answer: FALSE Difficulty: Easy Reference: p. 272
48. Fiber-optic cable is more difficult to work with and harder to install than wire media. Answer: 49. TRUE Difficulty: Easy Reference: p. 272

The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes. Answer: FALSE Difficulty: Hard Reference: p. 274

50. Answer: 51.

Frame relay is less expensive than packet switching. FALSE Difficulty: Medium Reference: p. 274

Every computer on the Internet is assigned a unique Internet Protocol (IP) address. Answer: TRUE Difficulty: Medium Reference: p. 277

52.

The success of the Internet is, in part, due to its design as an infinitely scalable network capable of handling millions of users. Answer: FALSE Difficulty: Medium Reference: p. 280

53.

A new version of the IP addressing schema being developed is called Internet Protocol version 6 (IPv6) and contains 128-bit addresses. Answer: TRUE Difficulty: Medium Reference: p. 280

54.

Internet2 is a research network with new protocols and transmission speeds that provides an infrastructure for supporting high-bandwidth Internet applications. Answer: TRUE Difficulty: Medium Reference: p. 280

55.

VoIP technology uses the Internet Protocol to deliver voice information in digital form using packet switching. Answer: TRUE Difficulty: Medium Reference: p. 289

56.

Digital cellular service uses several different competing standards that do not interoperate. Answer: Difficulty: Medium Reference: p. 292

57.

Most Wi-Fi communication uses infrastructure mode. Answer: Difficulty: Medium Reference: p. 295

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 6 . . 58. The 802.11 standard can be used to provide wireless access to the Internet using a broadband . connection. .
Answer: 59. Difficulty: Medium Reference: p. 295 RFID has been exceptionally popular because of its low implementation costs Answer: 60. Answer: Difficulty: Easy Reference: p. 299

Sensor networks typically have a tiered architecture Difficulty: Medium Reference: p. 299

Chapter 8: Securing Information Systems


61. The potential for unauthorized access is usually limited to the entry points of a network. Answer: 62. Difficulty: Easy Reference: p. 316

Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines. Answer: Difficulty: Easy Reference: p. 317

63.

The WEP specification calls for users to create unique 40-bit encrypted passwords. Answer: Difficulty: Hard Reference: p. 319

64.

Viruses cannot be spread through e-mail. Answer: Difficulty: Easy Reference: p. 319

65.

A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic. Answer: Difficulty: Easy Reference: p. 319

66.

Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer. Answer: Difficulty: Medium Reference: p. 320

67.

One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender. Answer: Difficulty: Medium Reference: p. 321

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 7 . . 68. Sniffers enable hackers to steal proprietary information from anywhere on a network, . including e-mail messages, company files, and confidential reports. .
Answer: 69. Difficulty: Medium Reference: p. 321 In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points. Answer: 70. Analysis Bot attacks can be prevented by using antivirus and antispyware software. Answer: Analysis in terms of examine 71. The most economically damaging kinds of computer crime are e-mail viruses. Answer: 72. Difficulty: Hard Reference: p. 325 Difficulty: Medium Reference: p. 323 Difficulty: Medium Reference: p. 322

Computer forensics experts try to recover ambient data, which are not visible to the average computer user. Answer: Difficulty: Medium Reference: pp. 329330

73.

An acceptable use policy defines the acceptable level of access to information assets for different users. Answer: Difficulty: Medium Reference: p. 331

74.

Fault-tolerant computers contain redundant hardware, software, and power supply components. Answer: Difficulty: Easy Reference: p. 333

75.

A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Answer: Difficulty: Easy Reference: p. 333

76.

Biometric authentication is the use of physical characteristics such as retinal images to provide identification. Answer: Difficulty: Easy Reference: p. 336

77.

NAT conceals the IP addresses of the organizations internal host computers to deter sniffer programs. Answer: Difficulty: Medium Reference: p. 338

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 8 . . 78. Antivirus software can detect and eliminate viruses that are trying to enter your system. . . Answer: Difficulty: Easy Reference: p. 338
79. SSL is a protocol used to secure information transfer over the Internet. Answer: 80. Difficulty: Easy Reference: p. 339

Public key encryption uses mathematically related keys. Answer: Difficulty: Medium Reference: p. 341

Chapter 9
Achieving Operational Excellence and Customer Intimacy: Enterprise Applications
81. Manufacturing companies typically think about their supply chains as a process ultimately focused on serving the customer. Answer: 82. Difficulty: Medium Reference: p. 355

Enterprise software allows data to be used by multiple functions and business processes for precise organizational coordination and control. Answer: Difficulty: Easy Reference: p. 359

83.

Companies can use configuration tables provided by the enterprise software to tailor a particular aspect of the system to the way it does business. Answer: Difficulty: Hard Reference: p. 359

84.

The upstream portion of the supply chain consists of the organizations and processes for distributing and delivering products to the final customers. Answer: Difficulty: Medium Reference: p. 361

85.

Supply chain inefficiencies can waste as much as 25 percent of a companys operating costs. Answer: Difficulty: Medium Reference: p. 361

86.

Low inventory acts a buffer for the lack of flexibility in the supply chain. Answer: Difficulty: Medium Reference: p. 362

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 9 . . 87. The bullwhip effect is the distortion of information about the demand for a product as it . passes from one entity to the next across the supply chain. .
Answer: 88. Difficulty: Medium Reference: p. 362 Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product. Answer: 89. Difficulty: Hard Reference: p. 364

In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes. Answer: Difficulty: Easy Reference: p. 365

90.

Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains. Answer: Difficulty: Easy Reference: p. 365

Chapter 10 : E-Commerce: Digital Markets, Digital Goods


91. E-commerce refers to the use of the Internet and the Web to transact business. Answer: 92. Answer: 93. Difficulty: Easy Reference: p. 392

Retail consumer e-commerce is currently growing at single-digit rates. Difficulty: Easy Reference: p. 392

The Internet shrinks information asymmetry. Answer: Difficulty: Medium Reference: p. 396

94.

Information asymmetry exists when one party in a transaction has more information for the transaction than the other party. Answer: Difficulty: Medium Reference: p. 396

95.

Disintermediation provides major benefits to the distributor. Answer: Difficulty: Medium Reference: p. 397

96.

A banner ad opens automatically and does not disappear until the user clicks on it. Answer: Difficulty: Medium Reference: p. 400

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 10 . . 97. An online syndicator aggregates content or applications from multiple sources, packaging . them for distribution, and reselling them to third-party Web sites. .
Answer: 98. Difficulty: Medium Reference: p. 403 Mobile commerce is the use of wireless devices to conduct e-commerce transactions from any location. Answer: 99. Difficulty: Easy Reference: p. 404

Web sites can gather bountiful detailed information about customer behavior and demographics. Answer: Difficulty: Easy Reference: p. 405

100.

Blogs have had a significant impact on political affairs. Answer: Difficulty: Easy Reference: p. 407

Chapter 11: Managing Knowledge


101. Knowledge residing in the minds of employees that has not been documented is called explicit knowledge. Answer: 102. Difficulty: Medium Reference: p. 432

Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents. Answer: Difficulty: Easy Reference: p. 432

103.

Knowledge is universally applicable and easily moved. Answer: Difficulty: Easy Reference: p. 433

104.

The CIO is a senior executive who is responsible for the firms knowledge management program. Answer: Difficulty: Easy Reference: p. 436

105.

COPs are formal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests. Answer: Difficulty: Medium Reference: p. 436

106.

Structured knowledge is explicit knowledge that exists in informal documents. Answer: Difficulty: Easy Reference: p. 437438

1 0

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 11 . . 107. Semistructured information is all the knowledge in a firm that resides in the heads of . experienced employees. .
Answer: 108. Difficulty: Medium Reference: p. 438 Knowledge workers are primarily clerical and data workers who usually do not possess high levels of education. Answer: Difficulty: Easy Reference: p. 448 VRML is platform dependent, operates over a minicomputer, and requires large amounts of bandwidth. Answer: Difficulty: Medium Reference: p. 450 Expert systems are the primary tools used for knowledge discovery. Answer: Difficulty: Easy Reference: p. 451

109.

110.

Chapter 12: Enhancing Decision Making


111. Unstructured decisions are novel and nonroutine, and there is no well-understood or agreedon procedure for making them. Answer: Difficulty: Easy Reference: p. 474 A structured decision can be made by following a well-defined set of procedures. No feel or intuition is necessary. Answer: Difficulty: Easy Reference: p. 474 Unstructured decision making is most prevalent at lower organizational levels. Answer: 114. Difficulty: Easy Reference: p. 475

112.

113.

Middle management tends to face more structured decision scenarios, and rarely include unstructured components. Answer: Difficulty: Easy Reference: p. 475

115.

Rank-and-file employees tend to make more structured decisions. Answer: Difficulty: Easy Reference: p. 475

116.

The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization. Answer: Difficulty: Easy Reference: p. 476

117.

The implementation phase of Simons decision making model includes choosing among solution alternatives. Answer: Difficulty: Medium Reference: p. 476

1 1

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 12 . . 118. The first stage in Simon's decision-making process model is the design stage. . . Answer: Difficulty: Easy Reference: p. 476
119. The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others. Answer: 120. Difficulty: Medium Reference: p. 477

MIS typically produce fixed, regularly scheduled reports based on data extracted and summarized from the firms underlying transaction processing systems. Answer: Difficulty: Easy Reference: p. 480

Chapter 13: Building Systems


121. The most common form of IT-enabled organizational change is automation. Answer: 122. Difficulty: Medium Reference: p. 514

Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system. Answer: Difficulty: Medium Reference: p. 515

123.

Rationalization of procedures describes a radical rethinking of the business models. Answer: Difficulty: Medium Reference: p. 515

124.

All business processes are composed of a flow of goods and services. Answer: Difficulty: Medium Reference: p. 520

125.

TQM describes the measurement of quality as 3.4 defects per million. Answer: Difficulty: Medium Reference: p. 523

126.

Thorough testing is not required if, during the programming stage, the design documents are sufficiently detailed. Answer: Difficulty: Medium Reference: p. 527

127.

The system is not in production until conversion is complete. Answer: Difficulty: Easy Reference: p. 528

128.

Documentation reveals how well the system has met its original objectives. Answer: Difficulty: Hard Reference: p. 528

1 2

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 13 . . 129. The oldest method for building information systems is prototyping. . . Answer: Difficulty: Medium Reference: p. 534
130. Prototyping is more iterative than the conventional lifecycle. Answer: Difficulty: Medium Reference: p. 535

Chapter 14: Project Management: Establishing the Business Value of


Systems and Managing Change
131. Between 30 and 40 percent of all software projects are runaway projects that far exceed original schedule and budget projections. Answer: 132. Difficulty: Medium Reference: p. 556

The information systems steering committee is composed of information systems managers and end-user managers responsible for overseeing several specific information systems projects. Answer: Difficulty: Hard Reference: p. 558

133.

An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals. Answer: Difficulty: Medium Reference: p. 559

134.

If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision. Answer: Difficulty: Medium Reference: p. 559

135.

Scoring models are used most commonly to support decisions rather than as the final arbiters of system selection. Answer: Difficulty: Medium Reference: p. 565

136.

Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information systems Answer: Difficulty: Hard Reference: p. 565

137.

A benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and soft factors such as benefits and complexity costs. Answer: Difficulty: Medium Reference: p. 565

1 3

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 14 . . 138. Intangible benefits cannot be immediately quantified but may lead to . quantifiable gains in the long run. .
Answer: 139. Difficulty: Easy Reference: p. 565 More timely information is a tangible benefit of information systems. Answer: 140. Difficulty: Medium Reference: p. 566

The IRR calculates the rate of return from an investment by adjusting the cash inflows produced by the investment for depreciation. Answer: Difficulty: Easy Reference: p. 570

Chapter 15: Managing Global Systems


141. The growth of international trade has radically altered domestic economies around the globe. Answer: Difficulty: Easy Reference: p. 596 Before you develop a corporate strategy and structure for globalization, a firm should determine the appropriate technology infrastructure. Answer: Difficulty: Easy Reference: pp. 597598 Global business drivers can be divided into two groups: general cultural factors and specific business factors. Answer: Difficulty: Medium Reference: p. 598 The collapse of the Eastern block has speeded the growth of a world culture. Answer: Difficulty: Easy Reference: p. 598 The growth of powerful communications technologies and the emergence of world cultures create the condition for global markets. Answer: Difficulty: Easy Reference: p. 599 Micromarketing is limited to marketing to very small geographic and social units within a domestic market. Answer: Difficulty: Medium Reference: p. 599 A powerful strategic advantage for a globalized firm is lowered cost factors in production. Answer: Difficulty: Easy Reference: p. 599 Particularism is a concept based on accepting the concept of a shared global culture and the penetration of domestic markets by foreign goods and services. Answer: Difficulty: Hard Reference: p. 600 At the cultural level, differences among cultures produce differences in social expectations, politics, and legal rules. Answer: Difficulty: Easy Reference: p. 600

142.

143.

144.

145.

146.

147.

148.

149.

1 4

. . ITCR-Maestra en Administracin de Empresas . Curso: AM1303 . Sistemas de Informacin Gerencial Examen parcial Instructor: M.Sc. Gerardo Brenes . Pgina: 15 . . 150. Globalization means that companies can be less concerned with the laws governing the . movement of information. . Answer: Difficulty: Easy Reference: p. 600
151. European countries have very strict laws concerning transborder data flows and privacy. Answer: Difficulty: Easy Reference: p. 600 The European Union Data Protection Directive restricts the flow of any information to countries that do not meet strict European laws on personal information. Answer: Difficulty: Medium Reference: p. 600 To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms have developed information systems within each European country. Answer: Difficulty: Medium Reference: p. 600 With the growth of the Internet and reliable phone networks, skilled consultants are readily available to companies operating in global markets. Answer: Difficulty: Easy Reference: p. 600 The accounting practices of a country are tightly intertwined with that countrys legal system. Answer: Difficulty: Easy Reference: p. 600 In international companies, English has become a kind of standard business language. Answer: Difficulty: Easy Reference: p. 601 In a multinational strategy, products and services on sale in different countries are adapted to serve local market conditions. Answer: Difficulty: Medium Reference: p. 602 Global systems allow fixed costs to be amortized over a much smaller customer base. Answer: Difficulty: Medium Reference: p. 610 The major telecommunications challenge in an international setting is making data flow seamlessly across networks shaped by disparate national standards. Answer: Difficulty: Easy Reference: p. 612 Private networks may not provide the same level of quick and predictable response as VPNs. Answer: Difficulty: Hard Reference: p. 613

152.

153.

154.

155.

156.

157.

158.

159.

160.

1 5

S-ar putea să vă placă și