26
. . . . . . . . . ITCR-Maestría en Administración de Empresas Curso: AM1303 Sistemas de Información Gerencial – Examen parcial Instructor: M.Sc. Gerardo Brenes Página: 1 Nombre del estudiante: _________________________________________ Carné: _______________ Las preguntas que son de “ True / False (falso / verdadero) solo se debe poner (verdadero) ó (falso) según sea el caso. Las que dicen “Multiple-Choice Questions “ es el estilo tradicional de escogencia única (solo se escoge una de las opciones planteadas y se anota la letra correspondiente. En cada pregunta se incluye el nivel estimado de dificultad junto con una aproximación de la página del libro donde se encuentra la clave de la respuesta. Las preguntas son en inglés cortesía de Pearson Educación y están agrupadas por capítulo del libro. En este caso incluyen capítulos del 1 al 4. . Chapter 5: IT Infrastructure and Emerging Technologies - Questions 1. IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise. Answer: Difficulty: Easy Reference: pp. 171– 172 2. Client/server computing is a widely used form of centralized processing. Answer: Difficulty: Medium Refere nce: pp. 175, 178 1

Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

Embed Size (px)

Citation preview

Page 1: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 1

Nombre del estudiante: _________________________________________ Carné: _______________

Las preguntas que son de “ True / False ” (falso / verdadero) solo se debe poner

(verdadero) ó (falso) según sea el caso.

Las que dicen “Multiple-Choice Questions “ es el estilo tradicional de escogencia única

(solo se escoge una de las opciones planteadas y se anota la letra correspondiente.

En cada pregunta se incluye el nivel estimado de dificultad junto con una aproximación de

la página del libro donde se encuentra la clave de la respuesta. Las preguntas son en

inglés cortesía de Pearson Educación y están agrupadas por capítulo del libro. En este

caso incluyen capítulos del 1 al 4. .

Chapter 5: IT Infrastructure and Emerging Technologies - Questions

1. IT infrastructure technology is purely a set of physical devices and software applications that are required to operate the entire enterprise.Answer: Difficulty: Easy Reference: pp. 171–172

2. Client/server computing is a widely used form of centralized processing.Answer: Difficulty: Medium Reference: pp. 175, 178

3. In two-tiered client/server architecture, the processing is split between two types of servers. Answer: Difficulty: Hard Reference: p. 175

4. Application server software is responsible for locating and managing stored Web pages.Answer: Difficulty: Medium Reference: p. 176

5. An application server may reside on the same computer as a Web server or on its own dedicated computer.Answer: Difficulty: Medium Reference: p. 176

6. Enterprise integration requires software that can link disparate applications and enable data to flow freely among different parts of the business.Answer: : Difficulty: Medium Reference: p. 177

7. The mainframe market has grown steadily over the past decade.Answer: Difficulty: Medium Reference: p. 186

8. The operating system is used to manage the computer’s activities.Answer: Difficulty: Easy Reference: p. 186

9. SANs create large central pools of storage that can be rapidly accessed and shared by multi-ple servers. Answer: Difficulty: Medium Reference: p. 187

1

Page 2: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 2

10. Like an ASP, a Web hosting service provides shared applications to subscribed users, but does this through a Web portal.Answer: Difficulty: Medium Reference: p. 188

11. Autonomic computing is implemented primarily with enterprise or ISP servers.Answer: Difficulty: Medium Reference: p. 192

12. N-tier computing is a multi-tier, load-balancing scheme for Web-based applications in which significant parts of Web site content, logic, and processing are performed by smaller, less ex-pensive servers located nearby the user.Answer: Difficulty: Hard Reference: pp. 175–176

13. Java software is designed to run on any computer or computing device, regardless of the spe-cific microprocessor or operating system it uses.Answer: Difficulty: Easy Reference: p. 198

14. Web services can exchange information between two different systems regardless of the op-erating system or programming languages on which the systems are based.Answer: Difficulty: Medium Reference: p. 200

15. XML is limited to describing how data should be presented in the form of Web pages; HTML can perform presentation, communication, and storage of data.Answer: Difficulty: Easy Reference: p. 200

16. Hypertext markup language specifies how text, graphics, video, and sound are placed on a Web page document.Answer: Difficulty: Easy Reference: p. 200

17. The collection of Web services that are used to build a firm’s software systems constitutes what is known as a service-oriented architecture.Answer: Difficulty: Medium Reference: p. 201

18. Today most business firms have discontinued operating their legacy systems, replacing these with inexpensive Web services and hosted software.Answer: Difficulty: Medium Reference: p. 204

19. Scalability refers to the ability of a computer, product, or system to expand to serve a large number of users without breaking down.Answer: Difficulty: Easy Reference: p. 209

20. TCO refers to the original cost of purchased technology: both hardware and software.Answer: Difficulty: Easy Reference: p. 211

Chapter 6: Foundations of Business Intelligence: Databases and Information Management

21. A grouping of characters into a word, a group of words, or a complete number is called a record.Answer: Difficulty: Easy Reference: p. 226

2

Page 3: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 3

22. Each characteristic or quality describing a particular entity is called an attribute.Answer: Difficulty: Easy Reference: pp. 226–227

23. A DBMS separates the logical and physical views of the data.Answer: Difficulty: Medium Reference: p. 229

24. Every record in a file should contain at least one key field.Answer: Difficulty: Easy Reference: p. 230

25. Many applications today require databases that can store and retrieve multimedia.Answer: Difficulty: Easy Reference: p. 233

26. One of the drawbacks to OODBMS are that they cannot work with applets.Answer: Difficulty: Medium Reference: p. 233

27. OODBMS are slower than relational DBMS.Answer: Difficulty: Medium Reference: p.233

28. A data dictionary is a language associated with a database management system that end users and programmers use to manipulate data in the database.Answer: Difficulty: Easy Reference: pp. 233–234

29. In a relational database, complex groupings of data must be streamlined to eliminate awk-ward many-to-many relationships.Answer: Difficulty: Easy Reference: p. 236

30. A data warehouse may be updated by a legacy system.Answer: Difficulty: Easy Reference: p. 239

31. A data warehouse is typically comprised of several smaller data marts.Answer: Difficulty: Medium Reference: p. 239

32. OLAP is a key tool of BI.Answer: Difficulty: Easy Reference: p. 240

33. OLAP enables users to obtain online answers to ad-hoc questions in a fairly rapid amount of time, except when the data are stored in very large databases.Answer: Difficulty: Medium Reference: p. 241

34. Data mining can be a challenge to individual privacy.Answer: Difficulty: Easy Reference: p. 243

35. Predictive analysis is synonymous with data mining.Answer: Difficulty: Hard Reference: p. 243

36. In a Web-based database, middleware is used to transfer information from the organization’s internal database back to the Web server for delivery in the form of a Web page to the user.Answer: Difficulty: Medium Reference: p. 245

3

Page 4: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 4

37. A Web interface requires changes to the internal database.

Answer: Difficulty: Easy Reference: p. 246

38. Common Gateway Interface is a specification for processing data on a Web server.

Answer: Difficulty: Medium Reference: p. 245

39. Data administration is a special organizational function that manages the policies and proce-dures through which data can be managed as an organizational resource.

Answer: Difficulty: Medium Reference: p. 247

40. Data cleansing is the same process as data scrubbing.

Answer: Difficulty: Easy Reference: p. 248

Chapter 7: Telecommunications, the Internet, and Wireless Technology

41. Telephone networks are fundamentally different from computer networks.

Answer: TRUE Difficulty: Medium Reference: p. 263

42. A NOS must reside on a dedicated server computer.

Answer: FALSE Difficulty: Easy Reference: p. 265

43. In a client/server network, a network server sets the rule of communication for a network and provides every connected client with an address so it can be found by others on the network.

Answer: TRUE Difficulty: Easy Reference: p. 267

44. Circuit switching makes much more efficient use of the communications capacity of a network than does packet switching

Answer: FALSE Difficulty: Easy Reference: p. 267

45. Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

Answer: TRUE Difficulty: Easy Reference: p. 269

46. In a ring topology, one station transmits signals, which travel in both directions along a single transmission segment.

Answer: FALSE Difficulty: Medium Reference: p. 271

4

Page 5: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 5

47. Twisted wire can be used to connect to the Internet at speeds up to 1 Mbps

Answer: FALSE Difficulty: Easy Reference: p. 272

48. Fiber-optic cable is more difficult to work with and harder to install than wire media.

Answer: TRUE Difficulty: Easy Reference: p. 272

49. The number of cycles per second that can be sent through any telecommunications medium is measured in kilobytes.

Answer: FALSE Difficulty: Hard Reference: p. 274

50. Frame relay is less expensive than packet switching.

Answer: FALSE Difficulty: Medium Reference: p. 274

51. Every computer on the Internet is assigned a unique Internet Protocol (IP) address.

Answer: TRUE Difficulty: Medium Reference: p. 277

52. The success of the Internet is, in part, due to its design as an infinitely scalable network capable of handling millions of users.

Answer: FALSE Difficulty: Medium Reference: p. 280

53. A new version of the IP addressing schema being developed is called Internet Protocol ver-sion 6 (IPv6) and contains 128-bit addresses.

Answer: TRUE Difficulty: Medium Reference: p. 280

54. Internet2 is a research network with new protocols and transmission speeds that provides an infrastructure for supporting high-bandwidth Internet applications.

Answer: TRUE Difficulty: Medium Reference: p. 280

55. VoIP technology uses the Internet Protocol to deliver voice information in digital form using packet switching.

Answer: TRUE Difficulty: Medium Reference: p. 289

56. Digital cellular service uses several different competing standards that do not interoperate.

Answer: Difficulty: Medium Reference: p. 292

57. Most Wi-Fi communication uses infrastructure mode.

Answer: Difficulty: Medium Reference: p. 295

5

Page 6: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 6

58. The 802.11 standard can be used to provide wireless access to the Internet using a broadband connection.

Answer: Difficulty: Medium Reference: p. 295

59. RFID has been exceptionally popular because of its low implementation costs

Answer: Difficulty: Easy Reference: p. 299

60. Sensor networks typically have a tiered architecture

Answer: Difficulty: Medium Reference: p. 299

Chapter 8: Securing Information Systems

61. The potential for unauthorized access is usually limited to the entry points of a network.

Answer: Difficulty: Easy Reference: p. 316

62. Computers using a DSL line are generally more vulnerable to outside intruders than older dial-up lines.

Answer: Difficulty: Easy Reference: p. 317

63. The WEP specification calls for users to create unique 40-bit encrypted passwords.

Answer: Difficulty: Hard Reference: p. 319

64. Viruses cannot be spread through e-mail.

Answer: Difficulty: Easy Reference: p. 319

65. A worm is a computer virus that replicates and spreads itself, not only from file to file, but also from computer to computer via e-mail and other Internet traffic.

Answer: Difficulty: Easy Reference: p. 319

66. Trojan horse software is designed to record keystrokes and mouse clicks performed at the computer.

Answer: Difficulty: Medium Reference: p. 320

67. One form of spoofing involves forging the return address on an e-mail so that the e-mail message appears to come from someone other than the sender.

Answer: Difficulty: Medium Reference: p. 321

6

Page 7: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 7

68. Sniffers enable hackers to steal proprietary information from anywhere on a network, includ-ing e-mail messages, company files, and confidential reports.

Answer: Difficulty: Medium Reference: p. 321

69. In a DDoS attack, numerous computers are used to inundate and overwhelm a network from numerous launch points.

Answer: Difficulty: Medium Reference: p. 322

70. Analysis

Bot attacks can be prevented by using antivirus and antispyware software.

Answer: Difficulty: Medium Reference: p. 323

Analysis in terms of examine

71. The most economically damaging kinds of computer crime are e-mail viruses.

Answer: Difficulty: Hard Reference: p. 325

72. Computer forensics experts try to recover ambient data, which are not visible to the average computer user.

Answer: Difficulty: Medium Reference: pp. 329–330

73. An acceptable use policy defines the acceptable level of access to information assets for dif-ferent users.

Answer: Difficulty: Medium Reference: p. 331

74. Fault-tolerant computers contain redundant hardware, software, and power supply compo-nents.

Answer: Difficulty: Easy Reference: p. 333

75. A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system.

Answer: Difficulty: Easy Reference: p. 333

76. Biometric authentication is the use of physical characteristics such as retinal images to pro-vide identification.

Answer: Difficulty: Easy Reference: p. 336

77. NAT conceals the IP addresses of the organization’s internal host computers to deter sniffer programs.

Answer: Difficulty: Medium Reference: p. 338

7

Page 8: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 8

78. Antivirus software can detect and eliminate viruses that are trying to enter your system.

Answer: Difficulty: Easy Reference: p. 338

79. SSL is a protocol used to secure information transfer over the Internet.

Answer: Difficulty: Easy Reference: p. 339

80. Public key encryption uses mathematically related keys.

Answer: Difficulty: Medium Reference: p. 341

Chapter 9

Achieving Operational Excellence and Customer Intimacy: Enterprise Applications

81. Manufacturing companies typically think about their supply chains as a process ultimately focused on serving the customer.

Answer: Difficulty: Medium Reference: p. 355

82. Enterprise software allows data to be used by multiple functions and business processes for precise organizational coordination and control.

Answer: Difficulty: Easy Reference: p. 359

83. Companies can use configuration tables provided by the enterprise software to tailor a partic-ular aspect of the system to the way it does business.

Answer: Difficulty: Hard Reference: p. 359

84. The upstream portion of the supply chain consists of the organizations and processes for dis-tributing and delivering products to the final customers.

Answer: Difficulty: Medium Reference: p. 361

85. Supply chain inefficiencies can waste as much as 25 percent of a company’s operating costs.

Answer: Difficulty: Medium Reference: p. 361

86. Low inventory acts a buffer for the lack of flexibility in the supply chain.

Answer: Difficulty: Medium Reference: p. 362

87. The bullwhip effect is the distortion of information about the demand for a product as it passes from one entity to the next across the supply chain.

Answer: Difficulty: Medium Reference: p. 362

8

Page 9: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 9

88. Supply chain execution systems enable the firm to generate demand forecasts for a product and to develop sourcing and manufacturing plans for that product.

Answer: Difficulty: Hard Reference: p. 364

89. In the pre-Internet environment, supply chain coordination was hampered by the difficulties of making information flow smoothly among different internal supply chain processes.

Answer: Difficulty: Easy Reference: p. 365

90. Intranets can be used to integrate information from isolated business processes within the firm to help them manage their internal supply chains.

Answer: Difficulty: Easy Reference: p. 365

Chapter 10 : E-Commerce: Digital Markets, Digital Goods

91. E-commerce refers to the use of the Internet and the Web to transact business.

Answer: Difficulty: Easy Reference: p. 392

92. Retail consumer e-commerce is currently growing at single-digit rates.

Answer: Difficulty: Easy Reference: p. 392

93. The Internet shrinks information asymmetry.

Answer: Difficulty: Medium Reference: p. 396

94. Information asymmetry exists when one party in a transaction has more information for the transaction than the other party.

Answer: Difficulty: Medium Reference: p. 396

95. Disintermediation provides major benefits to the distributor.

Answer: Difficulty: Medium Reference: p. 397

96. A banner ad opens automatically and does not disappear until the user clicks on it.

Answer: Difficulty: Medium Reference: p. 400

97. An online syndicator aggregates content or applications from multiple sources, packaging them for distribution, and reselling them to third-party Web sites.

Answer: Difficulty: Medium Reference: p. 403

9

Page 10: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 10

98. Mobile commerce is the use of wireless devices to conduct e-commerce transactions from any location.

Answer: Difficulty: Easy Reference: p. 404

99. Web sites can gather bountiful detailed information about customer behavior and demo-graphics.

Answer: Difficulty: Easy Reference: p. 405

100. Blogs have had a significant impact on political affairs.

Answer: Difficulty: Easy Reference: p. 407

Chapter 11: Managing Knowledge

101. Knowledge residing in the minds of employees that has not been documented is called ex-plicit knowledge.

Answer: Difficulty: Medium Reference: p. 432

102. Knowledge can reside in e-mail, voice mail, graphics, and unstructured documents as well as structured documents.

Answer: Difficulty: Easy Reference: p. 432

103. Knowledge is universally applicable and easily moved.

Answer: Difficulty: Easy Reference: p. 433

104. The CIO is a senior executive who is responsible for the firm’s knowledge management pro-gram.

Answer: Difficulty: Easy Reference: p. 436

105. COPs are formal social networks of professionals and employees within and outside the firm who have similar work-related activities and interests.

Answer: Difficulty: Medium Reference: p. 436

106. Structured knowledge is explicit knowledge that exists in informal documents.

Answer: Difficulty: Easy Reference: p. 437–438

107. Semistructured information is all the knowledge in a firm that resides in the heads of experi-enced employees.

Answer: Difficulty: Medium Reference: p. 438

10

Page 11: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 11

108. Knowledge workers are primarily clerical and data workers who usually do not possess high levels of education.Answer: Difficulty: Easy Reference: p. 448

109. VRML is platform dependent, operates over a minicomputer, and requires large amounts of bandwidth.Answer: Difficulty: Medium Reference: p. 450

110. Expert systems are the primary tools used for knowledge discovery.Answer: Difficulty: Easy Reference: p. 451

Chapter 12: Enhancing Decision Making

111. Unstructured decisions are novel and nonroutine, and there is no well-understood or agreed-on procedure for making them.Answer: Difficulty: Easy Reference: p. 474

112. A structured decision can be made by following a well-defined set of procedures. No “feel” or intuition is necessary. Answer: Difficulty: Easy Reference: p. 474

113. Unstructured decision making is most prevalent at lower organizational levels.

Answer: Difficulty: Easy Reference: p. 475

114. Middle management tends to face more structured decision scenarios, and rarely include un-structured components.

Answer: Difficulty: Easy Reference: p. 475

115. Rank-and-file employees tend to make more structured decisions.

Answer: Difficulty: Easy Reference: p. 475

116. The intelligence phase of decision making consists of discovering, identifying, and understanding the problems occurring in the organization.

Answer: Difficulty: Easy Reference: p. 476

117. The implementation phase of Simon’s decision making model includes choosing among so-lution alternatives.

Answer: Difficulty: Medium Reference: p. 476

118. The first stage in Simon's decision-making process model is the design stage.

Answer: Difficulty: Easy Reference: p. 476

11

Page 12: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 12

119. The classical model of management does not address what exactly managers do when they plan, decide things, and control the work of others.

Answer: Difficulty: Medium Reference: p. 477

120. MIS typically produce fixed, regularly scheduled reports based on data extracted and summa-rized from the firm’s underlying transaction processing systems.

Answer: Difficulty: Easy Reference: p. 480

Chapter 13: Building Systems

121. The most common form of IT-enabled organizational change is automation.

Answer: Difficulty: Medium Reference: p. 514

122. Failure to address properly the organizational changes surrounding the introduction of a new system can cause the demise of an otherwise good system.

Answer: Difficulty: Medium Reference: p. 515

123. Rationalization of procedures describes a radical rethinking of the business models.

Answer: Difficulty: Medium Reference: p. 515

124. All business processes are composed of a flow of goods and services.

Answer: Difficulty: Medium Reference: p. 520

125. TQM describes the measurement of quality as 3.4 defects per million.

Answer: Difficulty: Medium Reference: p. 523

126. Thorough testing is not required if, during the programming stage, the design documents are sufficiently detailed.

Answer: Difficulty: Medium Reference: p. 527

127. The system is not in production until conversion is complete.

Answer: Difficulty: Easy Reference: p. 528

128. Documentation reveals how well the system has met its original objectives.

Answer: Difficulty: Hard Reference: p. 528

129. The oldest method for building information systems is prototyping.

Answer: Difficulty: Medium Reference: p. 534

12

Page 13: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 13

130. Prototyping is more iterative than the conventional lifecycle.

Answer: Difficulty: Medium Reference: p. 535

Chapter 14: Project Management: Establishing the Business Value of Systems and Managing Change

131. Between 30 and 40 percent of all software projects are “runaway” projects that far exceed original schedule and budget projections.

Answer: Difficulty: Medium Reference: p. 556

132. The information systems steering committee is composed of information systems managers and end-user managers responsible for overseeing several specific information systems projects.

Answer: Difficulty: Hard Reference: p. 558

133. An information systems plan contains a statement of corporate goals and specifies how information technology will support the attainment of those goals.

Answer: Difficulty: Medium Reference: p. 559

134. If an intended benefit of an IT project is improved decision making, managers should develop a set of metrics to quantify the value of an improved decision.

Answer: Difficulty: Medium Reference: p. 559

135. Scoring models are used most commonly to support decisions rather than as the final arbiters of system selection.

Answer: Difficulty: Medium Reference: p. 565

136. Transaction and clerical systems that displace labor and save space typically produce more measurable, tangible benefits than management information systems

Answer: Difficulty: Hard Reference: p. 565

137. A benefit of using TCO analysis to evaluate an information technology investment is that it is able to incorporate intangible and “soft” factors such as benefits and complexity costs.

Answer: Difficulty: Medium Reference: p. 565

138. Intangible benefits cannot be immediately quantified but may lead to quantifiable gains in the long run.

Answer: Difficulty: Easy Reference: p. 565

13

Page 14: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 14

139. More timely information is a tangible benefit of information systems.

Answer: Difficulty: Medium Reference: p. 566

140. The IRR calculates the rate of return from an investment by adjusting the cash inflows produced by the investment for depreciation.

Answer: Difficulty: Easy Reference: p. 570

Chapter 15: Managing Global Systems

141. The growth of international trade has radically altered domestic economies around the globe. Answer: Difficulty: Easy Reference: p. 596

142. Before you develop a corporate strategy and structure for globalization, a firm should deter-mine the appropriate technology infrastructure.Answer: Difficulty: Easy Reference: pp. 597–598

143. Global business drivers can be divided into two groups: general cultural factors and specific business factors. Answer: Difficulty: Medium Reference: p. 598

144. The collapse of the Eastern block has speeded the growth of a world culture.Answer: Difficulty: Easy Reference: p. 598

145. The growth of powerful communications technologies and the emergence of world cultures create the condition for global markets. Answer: Difficulty: Easy Reference: p. 599

146. Micromarketing is limited to marketing to very small geographic and social units within a domestic market.Answer: Difficulty: Medium Reference: p. 599

147. A powerful strategic advantage for a globalized firm is lowered cost factors in production.Answer: Difficulty: Easy Reference: p. 599

148. Particularism is a concept based on accepting the concept of a shared global culture and the penetration of domestic markets by foreign goods and services. Answer: Difficulty: Hard Reference: p. 600

149. At the cultural level, differences among cultures produce differences in social expectations, politics, and legal rules. Answer: Difficulty: Easy Reference: p. 600

150. Globalization means that companies can be less concerned with the laws governing the movement of information.Answer: Difficulty: Easy Reference: p. 600

151. European countries have very strict laws concerning transborder data flows and privacy.Answer: Difficulty: Easy Reference: p. 600

14

Page 15: Gb Exam en Final Sig 2011 Enero Cap5!15!110213195310 Phpapp01

.........ITCR-Maestría en Administración de EmpresasCurso: AM1303 Sistemas de Información Gerencial – Examen parcialInstructor: M.Sc. Gerardo BrenesPágina: 15

152. The European Union Data Protection Directive restricts the flow of any information to coun-tries that do not meet strict European laws on personal information.Answer: Difficulty: Medium Reference: p. 600

153. To avoid the cost and uncertainty of moving information across national boundaries, most multinational firms have developed information systems within each European country.Answer: Difficulty: Medium Reference: p. 600

154. With the growth of the Internet and reliable phone networks, skilled consultants are readily available to companies operating in global markets.Answer: Difficulty: Easy Reference: p. 600

155. The accounting practices of a country are tightly intertwined with that country’s legal sys-tem.Answer: Difficulty: Easy Reference: p. 600

156. In international companies, English has become a kind of standard business language. Answer: Difficulty: Easy Reference: p. 601

157. In a multinational strategy, products and services on sale in different countries are adapted to serve local market conditions.Answer: Difficulty: Medium Reference: p. 602

158. Global systems allow fixed costs to be amortized over a much smaller customer base.Answer: Difficulty: Medium Reference: p. 610

159. The major telecommunications challenge in an international setting is making data flow seamlessly across networks shaped by disparate national standards.Answer: Difficulty: Easy Reference: p. 612

160. Private networks may not provide the same level of quick and predictable response as VPNs.Answer: Difficulty: Hard Reference: p. 613

15