Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
It is the extent to which a system enables the firm to accomplish goals well.
Which of the following scenarios demonstrates system efficiency?
The new information system at Barker's helped employees work faster, with less effort.
BelAir Tech replaced its outdated information system with a newer version. As a result, its employees reported a significant increase in work speed. Which of the following is most similar to BelAir's situation?
At Sterling Inc, the average number of application forms processed in an hour rose from 4 to 6 as a result of the new system.
B&Z Inc. implemented a new information system two months ago but there have been no concrete increases in productivity as a result of the system. A similar system has been in place at the company headquarters for the past two years, and this system has resulted in significant, quantifiable benefits. Which of the following reasons is the most likely explanation for the lack of results?
It can take years from the first implementation of this new system before the magnitude of benefits is felt by the organization.
Business case arguments based on ________ focus on beliefs about organizational strategy, competitive advantage, industry forces, customer perceptions, market share, and so on.
Business case arguments based on fear are based on ________.
the notion that if the system is not implemented, the firm will lose out to the competition or go out of business
Business case arguments based on data, quantitative analysis, and/or indisputable factors are known as arguments based on ________.
Which of the following is an example of a business case argument based on fear?
If we do not implement this system, our competitors could gain a significant advantage over us.
The total cost of ownership of a system refers to ________.
the total cost of acquisition and all costs associated with use and maintenance of a system
Which of the following is an example of a recurring cost associated with an information system?
BelAir Tech is conducting a cost-benefit analysis for its IS department. In this, the salary of an employee is an example of a(n) ________.
BelAir Tech implements a new information system and sees a 5 percent increase in monthly sales after implementation. This is a(n) ________ of the system.
"Increased customer reach of the new Web-based system will result in at least a modest increase in sales." This statement represents ________ for the company.
Which of the following is an example of an intangible benefit for a firm?
identifies at what point tangible benefits equal tangible costs
A method for deciding among different IS investments or when considering alternative designs for a given system is ________.
________ are alternative measures of outcomes that can help clarify what the impact of a change will be for a firm.
Which of the following is the main advantage of customizable software over off-the-shelf software?
The first phase of the systems development life cycle is ________.
During the first phase of the systems development life cycle, organizations ________.
identify, plan, and select a development project from all possible projects that could be performed
The final phase of the systems development life cycle is ________.
Requirements collection takes place during the ________ phase of the systems development life cycle.
________ is the process of gathering and organizing information from users, managers, customers, business processes, and documents to understand how a proposed information system should function.
________ is a group meeting-based process for requirements collection.
________ represent(s) the movement of data through an organization or within an information system.
________ represents the way in which data are transformed.
Processing logic is often expressed in ________, which is independent of the actual programming language being used.
After systems analysis, the next phase in the systems development life cycle is ________.
In an information system, a ________ is the point of contact between a system and users.
A ________ is a business document containing some predefined data, often including some areas where additional data can be filled in.
A ________ is a business document containing only predefined data for online viewing or printing.
The processing and logic operations of an information system refer(s) to ________.
the procedures that transform raw data inputs into new or modified information
Software programming and testing takes place during the ________ stage of the systems development process.
Which of the following best describes developmental testing?
testing the correctness of individual modules and the integration of multiple modules
________ testing is testing of the overall system to see whether it meets design requirements.
Jason has just made some changes to the information system at BelAir Tech and wants to check if the system is working correctly. He wants to conduct a beta test of the system. Which of the following should he do to achieve this?
He should ask users of the system to test it using actual data.
________ testing involves testing of the capabilities of the system in the user environment with actual data.
Developmental testing of an information system is performed by ________.
________ testing is performed by actual users of the system.
Which of the following can be considered beta testing?
System users at URP feed data into a new information system to test its capability.
Programming is the process of ________.
transforming the system design into a working computer system
46) ________ is the process of decommissioning the current way of doing things and installing the new system in the organization.
Which of the following is true for patch management?
It helps in testing the correctness of individual modules and the integration of multiple modules of a system.
________ use the Internet to check the software vendor's Web site for available fixes for problems. The application downloads and installs these in order to fix software flaws.
The process of making changes to an information system to evolve its functionality, to accommodate changing business needs, or to migrate it to a different operating environment is known as ________.
Preventive maintenance of a system involves ________.
making changes to a system to reduce the chance of future system failure
BelAir Tech has a five-member team in charge of the development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of perfective maintenance?
Justin works on the system to make the user interface more user-friendly.
BelAir Tech has a five-member team in charge of development and maintenance of its information systems. An information system is in place, and the team performs routine maintenance to keep it running smoothly. Which of the following scenarios is an example of adaptive maintenance?
Sara knows that the company is migrating to a new operating environment in the next month, and makes the appropriate changes to the system.
Which of the following is true for prototyping?
It uses a trial-and-error approach for discovering how a system should operate.
56) BelAir Tech needs a new information system to manage increasing customer orders and changing demands. The company's five-member IS team is competent and capable of developing a new system, but BelAir decides against developing a system in-house. Which of the following, if true, would most weaken BelAir's decision?
The company's IS team is short-staffed and is finding it difficult to cope with increased work.
Which of the following steps takes place in an organization during both in-house systems development as well as external acquisition?
BelAir has decided to buy an information system from an external vendor. The company has made a list of its requirements and asked prospective vendors to submit proposals for the system. Which of the following is the next step in the company's external acquisition process?
Which of the following statements is true for a request for proposal?
It is a list of user requirements sent to prospective vendors.
________ is the use of standardized performance tests to facilitate comparison between systems.
BelAir has submitted a request for proposal to a number of vendors. It must now evaluate the proposals it has received. Which of the following methods can it use to compare the different systems?
________ licenses are activated as soon as the packaging of the software has been removed.
A(n) ________ license refers to a license primarily used for downloaded software that requires computer users to choose "I accept"before installing the software.
An enterprise license is also known as a(n) ________ license.
Which of the following is true for software as a service?
It allows clients to access services on an as-needed basis.
BelAir Tech has developed and run its own information system for the past ten years. However, the company has now decided to outsource its IS function to a service provider. Which of the following, if true, will strengthen BelAir's decision?
BelAir has seen a fall in company revenue over the last year.
Which of the following is an example of a basic relationship between an outsourcing vendor and client?
BelAir sets its system preferences according to STS products.
Sign up for free and study better.
Get started today!