Search
Info
Warning
Danger

Study Resources (Accounting)

Multiple Choice 1) Collaboration takes place when two or more people ________. A) cooperate with each other to integrate individual efforts B) communicate their views about a subject C) work together to achieve a common goal D) coordinate to accomplish their individual tasks on time 2) Which of the following statements about collaboration is true? A) Iterations.
3 Views
View Answer
True or False 1) Pretexting occurs when someone deceives by pretending to be someone else. 2) Sniffing is usually initiated via email. 3) Incorrectly increasing a customer's discount is an example of incorrect data modification. 4) System errors are not caused by human error. 5) Denial-of-service attacks are caused by human error, not malicious intent. 6).
0 Views
View Answer
21) Business professionals should look at information systems and technologies only through the lens of business need. 22) Information systems can be bought whereas information technology cannot. 23) Strong passwords have five or more characters. 24) Good passwords contain a complete dictionary word. 25) The "do-si-do" move refers to the password etiquette one must.
0 Views
View Answer
11) The outermost components of the symmetrical five-component framework of an IS are data and procedures. 12) In the five-component framework of an IS, the actors are hardware and people. 13) Software and procedure components are both sets of instructions, in the IS framework. 14) Procedures act as the bridge between the computer.
0 Views
View Answer
11) Smart cards are convenient and easy to use since they don't require a PIN number for authentication. 12) A criticism against biometric authentication is that it provides weak authentication. 13) Most secure communication over the Internet uses a protocol called HTTP. 14) Viruses, worms, and Trojan horses are types of firewalls..
0 Views
View Answer
11) Which of the following is the LEAST important collaborative driver for one-time, ad hoc workgroups? A) content management B) communication C) workflow control D) iterations 12) Which of the following is true about collaborative teams? A) Team members must come to respect and trust each other. B) Enjoyment is essential to successful teamwork. C) Members in a.
2 Views
View Answer
1) Competitive strategy determines an organization's value chain. 2) Porter originally developed the five forces model in order to understand organizations' competitive environment. 3) According to Porter's five forces model, a company is profitable if all the five competitive forces are strong. 4) The bargaining power of competitors is one of the competitive.
0 Views
View Answer
21) Porter's model of business activities includes linkages, which are interactions across value activities. 22) Firm infrastructure excludes general management, finance, accounting, legal, and government affairs. 23) Business processes implement value chains or portions of value chains. 24) Supporting activities contribute to a margin and are easier to calculate than primary activities. 25) Manufacturing.
0 Views
View Answer
11) What are the three interdependent factors involved in the enforcement of security policies and procedures? 12) Explain account management. 13) What is the difference between a hot site and a cold site? 14) Describe an incident-response plan. 15) What should an organization do when a security breach occurs in its information .
1 Views
View Answer
11) Other than development tasks, what are the other roles than you will need to undertake in the use of information systems? 12) What are the points one needs to keep in mind when deciding to implement a management information system (MIS)? 13) Explain the difference and the relationship between information technology.
0 Views
View Answer
Multiple Choice 1) Synchronous communication is defined as ________. A) communication between similar people and groups in an organization B) communication between people working in the same department C) internal communication between the members of a specific group D) communication that occurs when all team members meet at the same time 2) Which of the following.
2 Views
View Answer
11) Creating and testing promising new alternatives, consistent with available resources is an example of ________. A) experimentation B) abstraction C) systems thinking D) collaboration 12) ________ is the ability to make and manipulate models. A) Abstract reasoning B) Systems thinking C) Social learning D) Experimentation 13) ________ is the ability to model the components of a unit, to connect.
1 Views
View Answer
31) Which of the following is an essential characteristic of a strong password? A) It should have at least 12 characters. B) It should contain a complete dictionary word. C) It should not contain many special characters. D) It should not contain your user name or company name. 32) You have created a password which.
0 Views
View Answer
6) Differentiate between value and margin. 7) Describe using an example, the primary activities in a value chain. 8) What is a value chain? List the primary activities in a value chain. a. In-bound logistics-which deals with receiving, storing, and disseminating inputs to the product b. Operations-which involves transforming inputs into the final product c..
0 Views
View Answer
1) The competitive strategy followed by an organization is derived from its ________. A) function B) structure C) profits D) goals 2) The competitive strategy of an organization determines its ________. A) industry rivals B) short-term goals C) value chains D) structure 3) In which of the following situations would the suppliers have the strongest bargaining power? A) coffee.
3 Views
View Answer
True or False 1) A successful collaborative team will not have conflicts. 2) Collaboration occurs when two or more people communicate with each other. 3) Collaboration is a process that takes place at the end of a project. 4) In a collaborative team, group members review each others' work product and revise that product.
0 Views
View Answer
11) Collaboration always involves feedback and iteration. 12) The team members' formative environments influence their ability to collaborate. 13) A team leader who expects and welcomes conflict can reduce collaboration within a team. 14) Conflict can be a productive and positive factor for a team's performance. 15) Personal attacks are a part of feedback.
0 Views
View Answer
1) A(n)________ is a network of activities, roles, resources, repositories, and data flows that interact to accomplish a business function. A) workgroup B) task force C) grid D) business process 2) ________ are collections of related tasks that receive inputs and process those inputs to produce outputs. A) Repositories B) Resources C) Activities D) Databases 3) In a business.
4 Views
View Answer
True or False 1) Asynchronous communication occurs when team members do not meet at the same time. 2) A face-to-face meeting is an example of asynchronous communication. 3) Virtual meetings can be synchronous or asynchronous. 4) Email is a tool used for asynchronous communication. 5) The use of discussion forums is a form of synchronous.
1 Views
View Answer
21) Accurate information is information that is based on correct and complete data, and has been processed correctly as expected. 22) Just barely sufficient information is information that is sufficient for the purpose for which it is generated, but only so. 23) A well-formatted report is characteristic of good information. 24) Relevant information.
1 Views
View Answer
21) Collecting, storing, and physically distributing the product to buyers describes which of the following primary activities? A) inbound logistics B) sales and marketing C) outbound logistics D) operations/management 22) Inducing buyers to purchase the product and providing a means for them to do so describes which of the following primary activities? A) inbound logistics B) sales.
0 Views
View Answer
21) Automation of a process activity consists of moving work from the ________ to the ________ of the symmetrical five-component framework. A) computer side; human side B) data side; procedures side C) human side; computer side D) software side; hardware side 22) Information is defined as ________. A) recorded facts and figures B) data that fits into.
0 Views
View Answer
11) According to Porter, to be effective the organization's goals, objectives, culture, and activities must be consistent with the organization's strategy 12) A business that selects a differentiation strategy would structure itself around least-cost activities. 13) Organizations analyze the structure of their industry, and, using that analysis, they formulate a competitive strategy. 14).
0 Views
View Answer
31) Because encryption keys can get lost or destroyed, a copy of the key should be stored with a trusted third party. This safety procedure is sometimes called ________. A) key escrow B) white hat C) key encryption D) biometric authentication 32) Which of the following is an example of a data safeguard? A) application.
0 Views
View Answer
1) Briefly describe how organizational strategy determines the structure of information systems. 2) Describe Porter's five forces model. 3) What are the four competitive strategies based on Porter's five forces model? 4) How does competitive strategy determine value chain structure? 5) Distinguish between a primary and a support activity in the value chain. .
0 Views
View Answer
11) Which of the following is true for shared content with version management? A) Content sharing methods that provide version management cannot accommodate concurrent work. B) Version management systems provide version control. C) Version management makes it impossible to know who changed the document and when. D) Systems that provide version management track changes.
1 Views
View Answer
21) ________ is the process of transforming clear text into coded, unintelligible text for secure storage or communication. A) Usurpation B) Authentication C) Standardization D) Encryption 22) Which of the following steps of the Secure Socket Layer is NOT true? A) The computer obtains the public key of the website to which it will connect. B).
0 Views
View Answer
12) What is the criterion on which business processes should run? 13) How can one develop competitive strategies using products? How can information systems help in the process? a. creating new products or services b. enhancing existing products or services c. differentiating their products and services from those of their competitors 14) Describe some competitive.
1 Views
View Answer
11) A(n) ________ is a collection of business records. A) repository B) role C) activity D) resource 12) Which of the following components of a business process holds the collective memory of an organization? A) decisions B) resources C) repositories D) activities 13) ________ are shown as scrolls in a business process flowchart. A) Roles B) Resources C) Decisions D) Repositories 14) What is the.
0 Views
View Answer
11) Define relevant information. Explain the importance of relevant information in an organizational context. 12) Explain the importance of just barely sufficient information in the information age we live in. 13) What are the costs associated with information? When is information considered to be worth its cost? 14) List the two major benefits.
1 Views
View Answer
6) Define information. 7) Explain data with an example. 8) Define accurate information. Why is an information system providing accurate information crucial to an organization? 9) Explain the importance of timeliness of information in an organization. 10) In some cases, developing systems that provide information in near real time is much more difficult.
0 Views
View Answer
6) What is experimentation? Explain its importance. 7) Describe an information system. 8) Describe the five components of an information system using an example. 9) Do you think a computer is an essential component of an information system? Why or why not? 10) Define management information systems. What are the key elements of its.
0 Views
View Answer
1) What is a business process? Define activities. 2) List the components of a business process. 1. Activities 2. Decisions 3. Roles 4. Resources 5. Repository 6. Data flow 3) Briefly describe a repository. 4) What are resources in a business process? 5) Describe the process of automation against the background of the five-component framework of an information system. .
0 Views
View Answer
1) Which device listed below is an example of an output hardware device? A) keyboard B) flatbed plotter C) CPU D) magnetic disk 2) Which of the following is considered to be input hardware? A)  keyboard B) video display C) speakers D)  plotter 3) Which of the following is sometimes called the "brain" of the computer? A) magnetic disk B) special function.
6 Views
View Answer
1) "The number of transistors per square inch on an integrated chip doubles every 18 months." This observation is known as ________ Law. A) Murphy's B) Moore's C) Amdahl's D) Metcalfe's 2) Which of the following statements best describes Moore's Law? A) A computer becomes obsolete within 18 months. B) The number of transistors per square inch.
4 Views
View Answer