Student’s Name: ______and I.D. ______

MAN352 Fall 2005 – Exam I

Good Luck. Part I – Identify the False statements in the below list, and circle their question numbers.

1. Peer-to-peer payment systems are the principal payment systems for electronic commerce. F 2. The Internet is an international network of commercial networks. F 3. Computer science, management science, and operations research all contribute to the technical approach to information systems. 4. Few businesses have an information value chain, in which raw information is systematically acquired and then transformed through various stages that add value to that information. F 5. Information systems literacy includes a behavioral as well as a technical approach to studying information systems. 6. Transaction processing systems are most commonly encountered at the management level of an organization. F 7. A hotel reservation system is a typical example of a management information system. F 8. Decision support systems generally provide answers to routine questions that have been specified in advance and have a predefined procedure for answering them. F 9. Information supplied by an enterprise-wide system is structured around cross-functional business processes. 10. KMS’s support processes for acquiring, storing, distributing, and applying knowledge, as well as processes for creating new knowledge and integrating it into the organization. 11. E-mail and instant messaging have become a dominant form of business communication. 12. The role of the CFO is a senior management position that oversees the use of information technology in a firm. F 13. The value chain model classifies all company activities as either primary or support. 14. The competitive forces model was created for today’s digital firm. F 15. One advantage of using Internet technology is that it provides the infrastructure to allow information to flow seamlessly from one part of the organization to another. 16. Web sites cannot currently provide customers with Web page/call center interaction. F 17. Many third-party Net marketplaces provide vertical markets for a single industry. 18. Web sites using "cookies" can directly obtain the names and addresses of their visitors. F 19. P3P encrypts or scrambles e-mail or data so that it illegal access to them is not possible. F 20. Radiation from computer display screens has been proved to be a factor in RSI. F Part II – Circle the correct choice among the four alternatives for each question.

1. ______is the ability to offer individually tailored products or services using the same production resources as bulk production. a. Mass customization X b. Size customization c. Magnitude customization d. Dimension customization

2. The ______model is used to describe the interaction of external influences, specifically threats and opportunities that affect an organization’s strategy and ability to compete. a. network economics b. competitive forces X c. strategic transitions d. environmental conditions

3. This traditional model assumes a relatively static industry environment, relatively clear-cut industry boundaries, and a relatively stable set of suppliers, substitutes, and customers, with a focus on industry players in a market environment: a. Porter’s competitive forces model. X b. Porter’s value chain model. c. Porter’s model of diminishing returns. d. Porter’s generic strategy model.

4. Buying and selling of goods and services electronically with computerized business transactions using the Internet, networks, and other digital technologies is called: a. electronic commerce. X b. electronic communications. c. electronic business. d. electronic exchanges.

5. Information is: a. the accumulation of raw data. b. the way we analyze problems. c. the best form of knowledge. d. data shaped into meaningful form. X

6. Electronic computers and related software programs are the technical foundation, the tools and materials, of: a. all business procedures. b. information accumulation. c. modern information systems. X d. all industrialized countries.

7. The shared information technology resources for the organization are called its: a. MIS plan. b. operational network. c. IT infrastructure. X d. business infrastructure. 8. Long-range strategic decisions about what products and services to produce are done by: a. middle managers. b. senior managers. X c. operational managers. d. supervisory personnel.

9. Engineers or architects who design products or services are called: a. data workers. b. service workers. c. information specialists. d. knowledge workers. X

10. A relocation control system that reports on the total moving, house-hunting, and home financing costs for employees in all company divisions is an example of a(n): a. knowledge management system. b. operational-level systems. c. strategic-level system. d. management-level system. X

11. The transaction broker Internet business model: a. generates revenue from advertising or from directing buyers to sellers. b. saves users money and time by processing online sales dealings. X c. provides a digital environment where buyers and sellers can establish prices for products. d. sells physical products directly to consumers or individual businesses.

12. Identifying customers for the firm’s products and preparing five-year forecasts are examples of: a. manufacturing and production information systems. b. enterprise application information systems. c. human resources information systems. d. sales and marketing information systems. X

13. ______is the process that integrates supplier, manufacturer, distributor, and customer logistics processes. a. Collaborative distribution b. Supply chain management X c. Reverse logistics d. Enterprise planning

14. Which of these does not supply data for customer relationship management systems? a. field sales b. inventory purchases X c. customer purchases d. marketing campaigns

15. Immanuel Kant’s Categorical Imperative states that: a. if an action cannot be taken repeatedly, then it is not right to be taken at any time. b. one should take the action that produces the least harm or incurs the least cost. c. one can put values in rank order and understand the consequences of various courses of action. d. if an action is not right for everyone to take, it is not right for anyone to take. X 16. Internet-based systems are more vulnerable to penetration by outsiders than private networks because: a. so many people see each message. b. most Internet companies do not have adequate firewalls. c. the Internet was designed as an open environment. X d. a computer in the home environment is insecure.

17. Intellectual property can best be described as: a. intangible creative work that is embodied in physical form. X b. the legal protection afforded an expression of an idea. c. the Fair Use Doctrine that allows for the use of copyrighted materials. d. software that is copied and distributed without permission.

18. The “do anything anywhere” computing environment can: a. make work environments much more pleasant. b. create economies of efficiency. c. centralize power at corporate headquarters. d. blur the traditional boundaries between work and family time. X

19. The practice of spamming has been growing because: a. telephone solicitation is no longer legal. b. it is good advertising practice and brings in many new customers. c. it helps pay for the Internet. d. it is so inexpensive and can reach so many people. X

20. Which of the following refers to large disparities in access to computers and the Internet among different social groups and different locations? a. Computer divide b. Technology divide c. Digital divide X d. Information divide

21. CVS refers to: a. eyestrain related to computer display screen use. X b. computer virus syndrome. c. wrist injuries brought about by incorrect hand position when using a keyboard. d. stress induced by computer use.

22. A measurement of how many people a business can connect with and how many products it can offer those people best defines: a. reach. X b. intensity. c. micromarketing. d. richness.

23. Which of the following businesses utilizes the content provider Internet business model? a. Amazon.com b. eBay.com c. CNN.com X d. Motocross.com