click below
click below
Normal Size Small Size show me how
CILS - Exam 1
| Question | Answer |
|---|---|
| Which of the following is an impact of rapid technological change on job security? | Nonroutine cognitive skills have gained more market value. |
| The number of transistors per square inch on an integrated chip doubles every 18 months. This observation is known as ________ Law. | Moore's |
| Which of the following statements is true about the management and use of information systems? | Information systems must be adapted to new requirements. |
| In a grocery store, a clerk uses a barcode scanner to read the barcode on an item. Which of the following components of an information system includes this scanning device? | hardware |
| ________ refers to the products, methods, inventions, and standards that are used to produce information. | Information technology |
| ________ is making a reasoned analysis of an opportunity, envisioning potential solutions, evaluating those possibilities, and developing the most promising ones, consistent with the available resources. | Experimentation |
| Which of the following statements is true about information systems? | They are a group of components that produce information. |
| Which of the following is a result of Moore's law? | The price to performance ratio of computers has fallen dramatically. |
| In a job interview, Lillian is asked to be part of a three-member group and design a mock business process based on the strengths and skills of the group's members. In this case, which of the following skills is the interviewer trying to test? | collaboration |
| ________ is the ability to make and manipulate models. | Abstract reasoning |
| Security systems ultimately depend on the behavior of their ________. | users |
| Which of the following requirements should a password fulfill in order to be considered strong? | It should not contain the user name or company name. |
| A password is said to be weak if it contains ________. | a complete dictionary word |
| Which of the following passwords is the strongest? | BL@k2V1.0.1 |
| The five-component framework of an information system consists of computer hardware, software, data, people, and ________. | procedures |
| What should be done if someone needs to log into a user's account to solve a problem and asks for the user's password? | The user should enter the password themselves. |
| Which of the following best describes collaboration? | It is the activity of two or more people working together to achieve a common goal, result, or work product. |
| ________ is the ability to model the components of a unit to connect the inputs and outputs among those components into a sensible whole that reflects the structure and dynamics of the phenomenon observed. | Systems thinking |
| A user has created a password that meets all the criteria for a strong password. What is a potential drawback of such a password? | It will be difficult to remember. |
| Which of the following components distinguishes information systems from information technology? | people |
| ________ is the ratio of benefits to costs. | Efficiency |
| Which of the following information is good information for the CEO of a call center? | department-level averages of revenue generation figures |
| In the swimlane format, the specific tasks that need to be accomplished as part of a business process are known as ________. | activities |
| Which of the following refers to information that is based on correct and complete data and has been processed correctly, as expected? | accurate information |
| Why is it important for data to be just barely sufficient? | It is important for data to be just barely sufficient so that it can be manageable. If it is too much data, it will take longer and be harder for it to manage, so it has to be just barely sufficient. |
| A(n) ________ is a collection of data that is stored within a business process. | repository |
| Automation of a process activity consists of moving work from the ________ of the symmetrical five-component framework. | human side to the computer side |
| According to the business process modeling notation, the end of a business process is symbolized by a ________. | circle having a thick border |
| Which of the following statements is true of the dimensions to measure process quality? | An effective business process enables an organization to accomplish its strategy. |
| ________ is defined as recorded facts or figures. | Data |
| Which of the following statements is true of the swimlane format? | It specifies the tasks that need to be accomplished as part of a business process. |
| Which of the following statements is true about data characteristics of quality information? | The timeliness of information can be measured against events. |
| According to the business process modeling notation standard, the start of a business process is symbolized by a ________. | circle having a narrow border |
| John's height is 6 feet 3 inches. This is a type of _______. | data |
| ________ is defined as knowledge derived from recorded facts or figures. | Information |
| A ________ is a network of activities for accomplishing a business function. | business process |
| Which of the following components of an information system play the role of actors? | hardware and people |
| "The average worker spends eight (8) hours per day. On average, Justin works nine (9) hours per day, one (1) hour more than the average worker." This statement is an example of ________. | information |
| Which of the following statements is true about roles in a business process? | The name of a role is written at the top of a swimlane. |
| The software and procedure components of the information systems framework are ________. | sets of instructions |
| According to Porter, the processes and systems in an organization pursuing differentiation strategy must ________ to avoid negative margins. | create sufficient value to cover their costs |
| Porter defined ________ as the amount of money that a customer is willing to pay for a resource, product, or service. | value |
| In Porter's five forces model, the two strength factors that relate to competitive forces are ________ and customer loyalty. | switching costs |
| Porter's five competitive forces can be grouped into two types: forces related to ________ and forces related to supply chain bargaining power. | competition |
| Which of the following statements describes a scenario in which the bargaining power of a supplier is strong? | The availability of raw materials is limited. |
| Which of the following is true of a value chain? | It is a network of value-creating activities. |
| Which of the following primary activities describes collecting, storing, and physically distributing products to buyers? | outbound logistics |
| Which of the following primary value chain activities encourage buyers to purchase a product and provide a means for them to do so? | sales and marketing |
| The competitive strategy followed by an organization is derived from the ________ of its industry. | structure |
| Each stage of the value chain not only adds value to the product but also ________. | accumulates costs |
| Simpson's Lawn Services decides to offer two free mowing services for all customers who booked garden landscaping in the fall. Which of the following forces is Simpson's Lawn Services addressing? | the threat posed by Roger's Landscapes, a new competitor |
| Which of the following is a primary activity in the value chain? | delivering products to consumers |
| Which of the following is a product implementation principle of competitive advantage? | enhance existing products or services |
| Which of the following is a process implementation principle of competitive advantage? | establishing alliances with other organizations |
| The difference between the value that an activity generates and the cost of the activity is called the ________. | margin |
| Which of the following is an example of a competitive strategy employed by a firm? | launching a unique product targeted at a section of consumers |
| Porter's model of business activities includes ________, which are interactions across value activities. | linkages |
| Which of the following statements describes suppliers in a position of strong bargaining power? | coffee planters during a season of frost that decreases production |
| In Porter's five forces model, each of the three competitive forces concerns the danger of ________. | customers taking their business elsewhere |